Behavioral task
behavioral1
Sample
4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe
Resource
win10v2004-20220812-en
General
-
Target
4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4
-
Size
58KB
-
MD5
1de64e1cf2bda73ede782673333d0e70
-
SHA1
5854fff0080e6d800f4dfebd0612f0b14b923882
-
SHA256
4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4
-
SHA512
e66f07b9d2a16355f61b2e8992408b6f08c8156b135b07fd9dd5f8777f28dc577f1b2e60bdb0c7abb05d7760a53b9889f21fd581a8fbb7e480b3749ba8d4933a
-
SSDEEP
768:+Hf+S26Iyfvcse5kzId8rH7R1fkGhg2QiGPL6QNcD3fTOZXKhB0q:yIyfvdzId8j7MGyPOZzTO6B0q
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE