Behavioral task
behavioral1
Sample
aba61944906d86ae116bba813a1d81581910ec75eca15b319ec13ee1051f6807.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aba61944906d86ae116bba813a1d81581910ec75eca15b319ec13ee1051f6807.exe
Resource
win10v2004-20220812-en
General
-
Target
aba61944906d86ae116bba813a1d81581910ec75eca15b319ec13ee1051f6807
-
Size
76KB
-
MD5
acafb595736bef344cd6914b075283f6
-
SHA1
3f8e1b52d1cb29f78e01c07495669c76a2a66108
-
SHA256
aba61944906d86ae116bba813a1d81581910ec75eca15b319ec13ee1051f6807
-
SHA512
3f9fc467fefdce5c22941699f06c98bab02bd1041725e1a64199fcc9cda3b2745659adc5b6d758176c06693e6c49b44e22f89bc8c78316176977686531ee7f33
-
SSDEEP
1536:0XFii58InauCk5vA9/wwtzftc92950IL7zfbjL9ATB6f+tLY3QoIaP:0Xse8InN5vAxw6zC929t37uV6f+tLYAy
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
aba61944906d86ae116bba813a1d81581910ec75eca15b319ec13ee1051f6807.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 176KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE