Behavioral task
behavioral1
Sample
c6f636c21a0eaa7be055556b4005cbd56d762c9018aca78e8776bb0cf770f220.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6f636c21a0eaa7be055556b4005cbd56d762c9018aca78e8776bb0cf770f220.exe
Resource
win10v2004-20221111-en
General
-
Target
c6f636c21a0eaa7be055556b4005cbd56d762c9018aca78e8776bb0cf770f220
-
Size
3KB
-
MD5
14aa2164136ead2816835ed5ad8074da
-
SHA1
08cd67d298c53561b254888df1db56deeb044991
-
SHA256
c6f636c21a0eaa7be055556b4005cbd56d762c9018aca78e8776bb0cf770f220
-
SHA512
c58f272fb638e72319fe1ec7f5fbfa32f9af0c98fee7164ef4fd2a8d1f596700db4bf895a01c7affc5a63573876401aeb07b75e93ecb73791bd0f278f3c870ee
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c6f636c21a0eaa7be055556b4005cbd56d762c9018aca78e8776bb0cf770f220.exe windows x86
6c3ddae3166c31d817ff94232e7de9ad
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesA
EnumResourceTypesA
ExitProcess
FindResourceA
GetProcAddress
IsDebuggerPresent
LoadLibraryA
LoadResource
LockResource
SizeofResource
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
advapi32
CryptAcquireContextA
CryptCreateHash
CryptDecrypt
CryptDeriveKey
CryptHashData
Sections
.UPX0 Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 512B - Virtual size: 105B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX2 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ