Behavioral task
behavioral1
Sample
cff4a737010f4d06f111a1e2a0d6d0569427bd8fe0d36d8137294d10eb20741f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cff4a737010f4d06f111a1e2a0d6d0569427bd8fe0d36d8137294d10eb20741f.exe
Resource
win10v2004-20220812-en
General
-
Target
cff4a737010f4d06f111a1e2a0d6d0569427bd8fe0d36d8137294d10eb20741f
-
Size
91KB
-
MD5
7fd7ddf1b70980b0e28656bf3153cebe
-
SHA1
b2ef229d273d71e0fdf8a1ae6cf7c287c71b60e7
-
SHA256
cff4a737010f4d06f111a1e2a0d6d0569427bd8fe0d36d8137294d10eb20741f
-
SHA512
23a5065cbe08c80db51dd9d7b4c5c3f779c5472afc34a7ad321468fb79bae893cd32f601ab3981c2e810ddac91013d31deca20ef2e79c1698e42fd02c72879b1
-
SSDEEP
768:bpCqGEyFyxj7cmZ0uoeIFc2kKZJ/ip6kZIwaF+EqnqDCqqXP0hO/1EHF1MyA0nkz:VCqGEdImZIzsG0ZTaNR8PhtOMaEFP7
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
cff4a737010f4d06f111a1e2a0d6d0569427bd8fe0d36d8137294d10eb20741f.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE