Behavioral task
behavioral1
Sample
b2d41ceab12b5d338eebc9c9b2c79e1848401f3cda3e71db72f98a7778dc7c14.exe
Resource
win7-20221111-en
General
-
Target
b2d41ceab12b5d338eebc9c9b2c79e1848401f3cda3e71db72f98a7778dc7c14
-
Size
137KB
-
MD5
22e7f8105cc76d08b3125886df8db080
-
SHA1
34efe1ecba3f1051bd477a9aa35d8f4e4281e7b3
-
SHA256
b2d41ceab12b5d338eebc9c9b2c79e1848401f3cda3e71db72f98a7778dc7c14
-
SHA512
fc7802091e69141b0cdba1a22539f3e6b8fdd1859cae7df4e1b87ccb84caa7badbb19da0baf1d2269507b3bf01fe662d49289796519dd6fc348dd158b7bbf5d1
-
SSDEEP
1536:34m5hdG7JS8dgsB6q3VUO1IrScrWamvw/7lNyLc2fkf1n4HaBRr9wzdgp0:3Fk7Icgs8qKQvQ7Xic2f4YaBRBmgK
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b2d41ceab12b5d338eebc9c9b2c79e1848401f3cda3e71db72f98a7778dc7c14.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE