Behavioral task
behavioral1
Sample
6e4bdc0ab1be07e7601a82c3e0f620981dd789ebaca9a893e7526307b3fbae9b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6e4bdc0ab1be07e7601a82c3e0f620981dd789ebaca9a893e7526307b3fbae9b.exe
Resource
win10v2004-20221111-en
General
-
Target
6e4bdc0ab1be07e7601a82c3e0f620981dd789ebaca9a893e7526307b3fbae9b
-
Size
431KB
-
MD5
0bdd710821866ea1867e596adc1244af
-
SHA1
c6b637fcc0b1723029dac69030aacb7420e1a7e8
-
SHA256
6e4bdc0ab1be07e7601a82c3e0f620981dd789ebaca9a893e7526307b3fbae9b
-
SHA512
6cfafac762d869d310ba1e7e3bcb20b58e2c318258a72ea70d1f1621a94bd11e1da3c6eaf8c626e287f3502ceb5ffa8d1614d085df74989a3a326c86f1dbbff1
-
SSDEEP
12288:jSNC80I+cR3R03VseuO85krrr67rrrrrrrrrrrrrrrrZeCs:j4ChZcRi3Vseskrrr6vrrrrrrrrrrrrS
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6e4bdc0ab1be07e7601a82c3e0f620981dd789ebaca9a893e7526307b3fbae9b.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 380KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rcpisyh Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hbnmmjp Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vvzijns Size: 9KB - Virtual size: 76KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE