Behavioral task
behavioral1
Sample
b48a0f24f047addfd779580ccba5f87fe6a1afdefbf7be89e27f71ae9f21ec66.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b48a0f24f047addfd779580ccba5f87fe6a1afdefbf7be89e27f71ae9f21ec66.exe
Resource
win10v2004-20221111-en
General
-
Target
b48a0f24f047addfd779580ccba5f87fe6a1afdefbf7be89e27f71ae9f21ec66
-
Size
43KB
-
MD5
49767edaa7f829293cbfef4a7f8a09cd
-
SHA1
37e681fa270c2b0682a2445bd0846423f28e6ecd
-
SHA256
b48a0f24f047addfd779580ccba5f87fe6a1afdefbf7be89e27f71ae9f21ec66
-
SHA512
9a10c6e0b2891de8bbdbcf6daa50d53b5693541073e85da44dfff46c286f2063dcb7cd8f8f9c842c92cf11c75767d02385f1b601e97e86a35069d5717c738916
-
SSDEEP
768:wsMcnYMHyse33x1BqikbQqvwwZd3ckrTh8a:kB1SbBvwwZds08
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b48a0f24f047addfd779580ccba5f87fe6a1afdefbf7be89e27f71ae9f21ec66.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hjohnhn9 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fzj3qwht Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
0niaacah Size: 67KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE