Behavioral task
behavioral1
Sample
ce4fe040d7b0d4632bae968d40379ed59845bc21c2c3546b8385240ab03afa9e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ce4fe040d7b0d4632bae968d40379ed59845bc21c2c3546b8385240ab03afa9e.exe
Resource
win10v2004-20220901-en
General
-
Target
ce4fe040d7b0d4632bae968d40379ed59845bc21c2c3546b8385240ab03afa9e
-
Size
31KB
-
MD5
31f0060ebb1668b0701624829b57c451
-
SHA1
2591b75235111255bd0080d293402befbbc94d7a
-
SHA256
ce4fe040d7b0d4632bae968d40379ed59845bc21c2c3546b8385240ab03afa9e
-
SHA512
4041f53b46b4c70280142beb3cdff12e225f75629544c04502c7907121acd2655897478003ea4fccf910d9ab99e4f3581d6538c115414d9f36607ec61986cafd
-
SSDEEP
384:uC8uX/Wf8Jt1rgRcRJAJoCvBqOF6xmeij05vxmlCZ+EXG9GhOLUMQtsnJdGVC7wF:KuW2t1rgkJAxBLp05vyCf/hOQmnvGA+
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
ce4fe040d7b0d4632bae968d40379ed59845bc21c2c3546b8385240ab03afa9e.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 160KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 117KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE