Behavioral task
behavioral1
Sample
61a711a012e80c16e6a1c79f11b04303a87c8d186b07b54df3116607352a9dd3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61a711a012e80c16e6a1c79f11b04303a87c8d186b07b54df3116607352a9dd3.exe
Resource
win10v2004-20220812-en
General
-
Target
61a711a012e80c16e6a1c79f11b04303a87c8d186b07b54df3116607352a9dd3
-
Size
25KB
-
MD5
6d6e87647f012572860d6fde6898cb1b
-
SHA1
7d1bd88602e2d0eeb7a2860f26a5e3ef190c21d2
-
SHA256
61a711a012e80c16e6a1c79f11b04303a87c8d186b07b54df3116607352a9dd3
-
SHA512
dabd1bb4f4eb4bf1a486b9207c0d3ba5b8aa882685bdeba51d8a0dce8d6788d89122fc8593122c329361d124c30510b79686a50854df5d79d01d5029e35344f9
-
SSDEEP
384:GK/X6IkrIRrj8PLhxLFvK/X6IkrIRr2bz:zX6cRxX6cR
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
61a711a012e80c16e6a1c79f11b04303a87c8d186b07b54df3116607352a9dd3.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dswlab Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE