Behavioral task
behavioral1
Sample
b67180338eedc0971f47e9608d08f729140b594ecd6a17b184e29066d53bac52.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b67180338eedc0971f47e9608d08f729140b594ecd6a17b184e29066d53bac52.exe
Resource
win10v2004-20221111-en
General
-
Target
b67180338eedc0971f47e9608d08f729140b594ecd6a17b184e29066d53bac52
-
Size
17KB
-
MD5
4033fa271b97650d9214c3160f432790
-
SHA1
6ffd2bae4b7e6f7da4b9a026dfae786864808a40
-
SHA256
b67180338eedc0971f47e9608d08f729140b594ecd6a17b184e29066d53bac52
-
SHA512
6090d503edfbd5231de5e37bd03238715fb30466900ecba9da24d87b3c884e94617c384db8705cdfe352b90f773af70cfcf1cb9f955c51320e3dd17092a56837
-
SSDEEP
384:KYY21mb/DP/8LCE2hwk+wkRVfDX7NbTmT6k8UkzpxLIVIjyRZc+D4a:o8LCE2hwkvqVfDXRbTmn8LphIVIjyn
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b67180338eedc0971f47e9608d08f729140b594ecd6a17b184e29066d53bac52.exe windows x86
fc1e39870f241f86419910152483c9e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
comctl32
ImageList_Add
gdi32
GdiFlush
advapi32
AccessCheck
msvcrt
printf
Sections
UPX0 Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE