Behavioral task
behavioral1
Sample
c934ae6e014a5d06eba698069f38fb5eef364bb96db6130079db54a632155a9d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c934ae6e014a5d06eba698069f38fb5eef364bb96db6130079db54a632155a9d.exe
Resource
win10v2004-20221111-en
General
-
Target
c934ae6e014a5d06eba698069f38fb5eef364bb96db6130079db54a632155a9d
-
Size
103KB
-
MD5
81cf5ec516346c3c923df51f07ab127b
-
SHA1
1e637ed4f15c1afdc7523fc7267cf20c9ac75423
-
SHA256
c934ae6e014a5d06eba698069f38fb5eef364bb96db6130079db54a632155a9d
-
SHA512
0510c69de0f212d350768db22b565a62074311cfe9e904a9f81bb697411ae03bc471c86ab9b8439359607d587c51ec1113261e829eb1511813399043e7368f51
-
SSDEEP
3072:CvmeoV7WS/4R2ikyXYLb9Sm/nyp1KjV4TTjO:6vwyXYLHtJS
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c934ae6e014a5d06eba698069f38fb5eef364bb96db6130079db54a632155a9d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 224KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 98KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mkdccjd Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE