Behavioral task
behavioral1
Sample
4ecb43d2082fbc0d7d0a3f555e7819ea6e554ee09052daddab202fbc7b18426e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ecb43d2082fbc0d7d0a3f555e7819ea6e554ee09052daddab202fbc7b18426e.exe
Resource
win10v2004-20220812-en
General
-
Target
4ecb43d2082fbc0d7d0a3f555e7819ea6e554ee09052daddab202fbc7b18426e
-
Size
55KB
-
MD5
298b5e04d2877ccd6dfbc7f51bdebc1a
-
SHA1
4a5878201cf465fa7cdc8edbf4ba84ea19fb2c4e
-
SHA256
4ecb43d2082fbc0d7d0a3f555e7819ea6e554ee09052daddab202fbc7b18426e
-
SHA512
6076b73bc501c9dd8d2dbcc246b18202d46bd86c9ad02a97ca71861403868c9117cbcf46a4ad7d9c73495bfef9ed97f7db025516ede692f6dbc097b101af3ddb
-
SSDEEP
384:zwznVKyqCvPSryiZueq5FxhYK+KdwMxSdamUnE8l/wnKsYgL400AuxIY:zQnwfCysB+KdwQS8fnZl/wnMG9Kf
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4ecb43d2082fbc0d7d0a3f555e7819ea6e554ee09052daddab202fbc7b18426e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 47KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE