Behavioral task
behavioral1
Sample
5d2032242510cc5123e74a7c1502b003dc1bfd81431e2b1b564c8ae5c8df00c4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5d2032242510cc5123e74a7c1502b003dc1bfd81431e2b1b564c8ae5c8df00c4.exe
Resource
win10v2004-20221111-en
General
-
Target
5d2032242510cc5123e74a7c1502b003dc1bfd81431e2b1b564c8ae5c8df00c4
-
Size
55KB
-
MD5
14fb7183db21633e9efabf82cbc62a46
-
SHA1
10d58622df0d8664ba5522af5a7a9797988c35bc
-
SHA256
5d2032242510cc5123e74a7c1502b003dc1bfd81431e2b1b564c8ae5c8df00c4
-
SHA512
6b61a6453bdf2002a3bdcb457fd626e4361dbc50f0977c0de644c9f6e2de2ec5d3463d11bad2584e46e8125384e11a6195fdaeb4c3b10ef111fcebdbb571c345
-
SSDEEP
768:GxkrA91JOWH2uwYhSEu4g28FiEDNn+0YZo3A31e:Gh1Jv2urC4xk+o3A3
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5d2032242510cc5123e74a7c1502b003dc1bfd81431e2b1b564c8ae5c8df00c4.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE