Behavioral task
behavioral1
Sample
d20db6eafd28959ee1146289956432f562e0f6fda242b08b7c0e9600c3992239.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d20db6eafd28959ee1146289956432f562e0f6fda242b08b7c0e9600c3992239.exe
Resource
win10v2004-20220901-en
General
-
Target
d20db6eafd28959ee1146289956432f562e0f6fda242b08b7c0e9600c3992239
-
Size
583KB
-
MD5
33f17ed1adb246900e2fbe405b86c932
-
SHA1
4cc9fccf4563e3d4bf40d26349963ab0c1d48d23
-
SHA256
d20db6eafd28959ee1146289956432f562e0f6fda242b08b7c0e9600c3992239
-
SHA512
3ccbde57a38d2bbdac99226857fde42049e569a0bdd790bb7c6ce45ad22a0382dc31b97adf834c6e6f17cf7e089151d82ae978c62f01deb82d5bcf52ebb29709
-
SSDEEP
12288:i6Wq4aaE6KwyF5L0Y2D1PqLxrTg65kje2chPlUWEQ5oateL0mRdHPBm5:gthEVaPqLJTSEUWE4oategWC
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d20db6eafd28959ee1146289956432f562e0f6fda242b08b7c0e9600c3992239.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 472KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 264KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE