Behavioral task
behavioral1
Sample
5316a5ba8266828dac03b4a6f1cf07dbe81a6dbfb0b9cfbd4e6be22193c2c2f6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5316a5ba8266828dac03b4a6f1cf07dbe81a6dbfb0b9cfbd4e6be22193c2c2f6.exe
Resource
win10v2004-20220812-en
General
-
Target
5316a5ba8266828dac03b4a6f1cf07dbe81a6dbfb0b9cfbd4e6be22193c2c2f6
-
Size
6KB
-
MD5
bd86c3bffbd60924fa4f158596a218e2
-
SHA1
7b85696aeb5c027cdc6db7bdfa0b828de12ae737
-
SHA256
5316a5ba8266828dac03b4a6f1cf07dbe81a6dbfb0b9cfbd4e6be22193c2c2f6
-
SHA512
cef158812b923103253c5b55bbb48043072283d13e3bab55979d45f3fadb197becd5d0754536b12a8b4e95e4b2c5cb127375b264063d9e05921f43fcb2316ef6
-
SSDEEP
192:UCt3WCPhyxvrbqZwCCsG2E04/zqUlp9qh:B3WwgFrqwrzqUfQ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5316a5ba8266828dac03b4a6f1cf07dbe81a6dbfb0b9cfbd4e6be22193c2c2f6.exe windows x86
b48c08c2b91cbeb00081797daf9dfe8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
SetHandleCount
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SUE Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE