Behavioral task
behavioral1
Sample
66b919f6ea39c9e2cbca27ea9ea38e311ab6f675e1eba079bb03392025517f31.exe
Resource
win7-20221111-en
General
-
Target
66b919f6ea39c9e2cbca27ea9ea38e311ab6f675e1eba079bb03392025517f31
-
Size
32KB
-
MD5
f68a90f998e90ffcb11ab0d7b75de16b
-
SHA1
55cb5c5cde3b21fdb6ff1c6f6392c8fd77ee891c
-
SHA256
66b919f6ea39c9e2cbca27ea9ea38e311ab6f675e1eba079bb03392025517f31
-
SHA512
d143753dfd8bccb1d457a82c6e281526a351afab3791542f4ff81f97b6b0ee7d46eb54d7a56a864c9c5b777968128c348a06850c05bf0c5385ab22924a6dad33
-
SSDEEP
768:UxFz5kOVJkhg5brDcfJzSczFUk4cdxHvrLnbcuyD7U:UxFT0hSbrDcfJzScxUu/jLnouy8
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
66b919f6ea39c9e2cbca27ea9ea38e311ab6f675e1eba079bb03392025517f31.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 72KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE