Behavioral task
behavioral1
Sample
e80a1fe3cf44714e08fc2321d35ab9d23c88658f4ab55b7b5c74c31614a37ca2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e80a1fe3cf44714e08fc2321d35ab9d23c88658f4ab55b7b5c74c31614a37ca2.exe
Resource
win10v2004-20220901-en
General
-
Target
e80a1fe3cf44714e08fc2321d35ab9d23c88658f4ab55b7b5c74c31614a37ca2
-
Size
111KB
-
MD5
afd7ad12b3f4c2676da520fbe84cc185
-
SHA1
73515eca129734ad7bd47b72cb4f6062445e6250
-
SHA256
e80a1fe3cf44714e08fc2321d35ab9d23c88658f4ab55b7b5c74c31614a37ca2
-
SHA512
7b20c31732571b58b05e1ec404585143a1552ffc65d91b441faef1a564c81c5672cf992fd55bda6e56ad0507bf6cb4539ff79aab2c32c303f4bbdc004150b28c
-
SSDEEP
3072:3oy8j7VnNdrPHaSekwi+mW+22QCF8Kelout:n8jZ7rvaU3+mWr2QCF8KUoS
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
e80a1fe3cf44714e08fc2321d35ab9d23c88658f4ab55b7b5c74c31614a37ca2.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE