Behavioral task
behavioral1
Sample
dbfa177ebe4cd47f8fefea2581a1825a859fd5fdb9cc14a33d501da45d899070.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dbfa177ebe4cd47f8fefea2581a1825a859fd5fdb9cc14a33d501da45d899070.exe
Resource
win10v2004-20221111-en
General
-
Target
dbfa177ebe4cd47f8fefea2581a1825a859fd5fdb9cc14a33d501da45d899070
-
Size
53KB
-
MD5
0fe485385b77c8b5946c6be339586028
-
SHA1
9fee2e8e2b678c17cd23842f11c39d5922d22987
-
SHA256
dbfa177ebe4cd47f8fefea2581a1825a859fd5fdb9cc14a33d501da45d899070
-
SHA512
7386eb011f40603e23799bd74b79f474ce934c1f345357e2e17989dc990ce22f79a90ab90f8b79964f20438fbbf15757ccd5b94457dc97923ac5f8a0b13c819c
-
SSDEEP
1536:7Kg9VLx9OinO8DzxV4a0gA1c4pxxLedtnQCWBAnouy8p:RVPOiO8xV4a07PdejPWBooutp
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dbfa177ebe4cd47f8fefea2581a1825a859fd5fdb9cc14a33d501da45d899070.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 144KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 48KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE