Behavioral task
behavioral1
Sample
d135e9a5d66652b298edbfa23b9ac398c2ea967aa4694c2875751caa805dd850.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d135e9a5d66652b298edbfa23b9ac398c2ea967aa4694c2875751caa805dd850.exe
Resource
win10v2004-20220812-en
General
-
Target
d135e9a5d66652b298edbfa23b9ac398c2ea967aa4694c2875751caa805dd850
-
Size
216KB
-
MD5
4bde88b315bbe68f383bf2c98ab116d6
-
SHA1
bf42d901657cd90250020f4d51d0c880b0e1c080
-
SHA256
d135e9a5d66652b298edbfa23b9ac398c2ea967aa4694c2875751caa805dd850
-
SHA512
ff452fdb055d35d1be4993225315aec52a66b71b5b0b22f6c8ec85e796efb128714dad5c090d233dc6a84b1851463435be1581b64defd73ba275d8bba999dabb
-
SSDEEP
3072:KytrlBREwZN8OcIaR3pxdj3zpWjaa+P2irq:KyI+NWBnbjAjT+P28q
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d135e9a5d66652b298edbfa23b9ac398c2ea967aa4694c2875751caa805dd850.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 260KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ybqmnjd Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rsroxuy Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE