Behavioral task
behavioral1
Sample
fa948e77b845d9554ee15cd334f62ca719bcdb461d88ac4c7daecdcf752e4677.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa948e77b845d9554ee15cd334f62ca719bcdb461d88ac4c7daecdcf752e4677.exe
Resource
win10v2004-20220812-en
General
-
Target
fa948e77b845d9554ee15cd334f62ca719bcdb461d88ac4c7daecdcf752e4677
-
Size
133KB
-
MD5
c800de9e970e8f22a1ecb5e0b7d96f03
-
SHA1
2469265e014449c3419fe41fb2f772ce162a9085
-
SHA256
fa948e77b845d9554ee15cd334f62ca719bcdb461d88ac4c7daecdcf752e4677
-
SHA512
b818b95c6d7f790d58118248ca0de11ac273d3602b0354fb861730a54d4fe4a1cbc6fd8101293bc3066b0b0759c581ab313aad81d2e93a3dd91e9852431c094b
-
SSDEEP
1536:Ghqq1UKF8uOwepjg8Ty2sjpRm3H5ReLopzxBedAgN1bPaDXvJP5rkBV:nVKlf8T2j+3ZtplBTgvLaDft5r6V
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fa948e77b845d9554ee15cd334f62ca719bcdb461d88ac4c7daecdcf752e4677.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 66KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE