Behavioral task
behavioral1
Sample
c586d1deea211fcbdcfc54634cbd8b473ac0d42975872d858b22b300031aa3b1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c586d1deea211fcbdcfc54634cbd8b473ac0d42975872d858b22b300031aa3b1.exe
Resource
win10v2004-20220812-en
General
-
Target
c586d1deea211fcbdcfc54634cbd8b473ac0d42975872d858b22b300031aa3b1
-
Size
14KB
-
MD5
37f4d7b41c89ae41feb357a4cfbcd110
-
SHA1
681aae8925ae73d648dd6db2fae3c8bf5c61a114
-
SHA256
c586d1deea211fcbdcfc54634cbd8b473ac0d42975872d858b22b300031aa3b1
-
SHA512
305392e65fa34c10ec58b91deaa7a665adbffc660a8b063542c549177733fe59d5df0f12f59158250685db2e8df8bad30dcbfbef12ec9c8367c558d3b84e6c96
-
SSDEEP
384:AQinGlV5lRwaM9IV3wag7YjIRV4mn29xMyj:Ad2gab2V4mnA2u
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c586d1deea211fcbdcfc54634cbd8b473ac0d42975872d858b22b300031aa3b1.exe windows x86
410a1cf5e716ffcc50f66067129699ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenGroups
kernel32
CreateThread
user32
BlockInput
gdi32
Chord
ws2_32
htonl
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE