Behavioral task
behavioral1
Sample
b16af33e07dd7c6a46c382cdee989a3c064fd54e727163e5c6fb7a006df42e98.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b16af33e07dd7c6a46c382cdee989a3c064fd54e727163e5c6fb7a006df42e98.exe
Resource
win10v2004-20221111-en
General
-
Target
b16af33e07dd7c6a46c382cdee989a3c064fd54e727163e5c6fb7a006df42e98
-
Size
110KB
-
MD5
6a50627bd18ae92a9a8833056cfd336b
-
SHA1
e91192d302efa2007762f6ca130d53e8f8443984
-
SHA256
b16af33e07dd7c6a46c382cdee989a3c064fd54e727163e5c6fb7a006df42e98
-
SHA512
d8b208561d5ee75f73fa196dfc7b5468e41a880101509058552cec6444693f8e8758bebe34fa6348c0dc54de483f5e55041a8020df15ed80386c4848d3094479
-
SSDEEP
1536:6VuNAXTj4Fj/91/NnLZqeWEPVpa8DzePjkgcwYS7S5+Vfk09GJsCwrcOwKnouy8y:ooy8j7VnNdrPHaSekwi+mWaeouty
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
b16af33e07dd7c6a46c382cdee989a3c064fd54e727163e5c6fb7a006df42e98.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 204KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE