Behavioral task
behavioral1
Sample
5bc2a0298d203e8457d93fe42cbe5bae0c313b16cdb1e1874af73fd266f1b271.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5bc2a0298d203e8457d93fe42cbe5bae0c313b16cdb1e1874af73fd266f1b271.exe
Resource
win10v2004-20220812-en
General
-
Target
5bc2a0298d203e8457d93fe42cbe5bae0c313b16cdb1e1874af73fd266f1b271
-
Size
101KB
-
MD5
ec3fd8dd34bcc42f7f75709f56baac19
-
SHA1
e5b18015501f9618688ed2ca10b631c4566b8427
-
SHA256
5bc2a0298d203e8457d93fe42cbe5bae0c313b16cdb1e1874af73fd266f1b271
-
SHA512
d02b9291e260c74e7987978c182b29719db6b62f4e9aa737152bca858f5c847a3d99134a5ecab72bdf680b0e55e5629887f55eab55d8fabfcc46fab87412863f
-
SSDEEP
3072:FG1mXs8MCD8t/hS7P0cYfOie+zG+kYokeoXFxFout:FG1d8M5t/MAcYfOiKaoklXFxFoS
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5bc2a0298d203e8457d93fe42cbe5bae0c313b16cdb1e1874af73fd266f1b271.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 192KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 99KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE