Behavioral task
behavioral1
Sample
101fb4604c2902878ddeaec47d537b9a1250a13e78b73c0acf85a5c9e1b40044.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
101fb4604c2902878ddeaec47d537b9a1250a13e78b73c0acf85a5c9e1b40044.exe
Resource
win10v2004-20221111-en
General
-
Target
101fb4604c2902878ddeaec47d537b9a1250a13e78b73c0acf85a5c9e1b40044
-
Size
488KB
-
MD5
f3e1bc07d4b2ca2dfdb7286063b206a0
-
SHA1
08caca9d2cb6333dd1073b19a3c3101b6ab9be92
-
SHA256
101fb4604c2902878ddeaec47d537b9a1250a13e78b73c0acf85a5c9e1b40044
-
SHA512
11bdf7618e0998d330316dbb508d7ed46a2cee9639c563deaaa90d12538540ecc1cdb5eff00fb0aba937bda6afffec9b383e018f7b7e2fad338e81759b2af47d
-
SSDEEP
6144:nYZTNk3D6LyUXwLLk+cR3qh0GQ43VJRD0ew+/UO4D8kOwYG1+vcbYODoR:nSNC80I+cR3R03VseuO4AkOwKvFb
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
101fb4604c2902878ddeaec47d537b9a1250a13e78b73c0acf85a5c9e1b40044.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 380KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RUPX1 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nkh Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE