Behavioral task
behavioral1
Sample
c64110fe666bb36add67c2dce032404951ff0378f0aab3b4f1e63eeb9a69bf8a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c64110fe666bb36add67c2dce032404951ff0378f0aab3b4f1e63eeb9a69bf8a.exe
Resource
win10v2004-20221111-en
General
-
Target
c64110fe666bb36add67c2dce032404951ff0378f0aab3b4f1e63eeb9a69bf8a
-
Size
254KB
-
MD5
6f0a12e34aafeb6949d470ccc9961e27
-
SHA1
5ea1faccbc417f1c51827eb9af52a6ae4322b2f4
-
SHA256
c64110fe666bb36add67c2dce032404951ff0378f0aab3b4f1e63eeb9a69bf8a
-
SHA512
09fc4490f3ac16aee8006b63b9b6515a55482ec355f5418b5178e96421ca1731121b905b9a1f2fbc3f87dfcc2e35703a9452ac3adcf8f56502e7959be64603d8
-
SSDEEP
3072:g51kljkliKj1FZTmsijTg+ZYdag5GndIoWr11gY+LlOszgAjJWt0iUEbPdjFOLwy:k1wkblp/5GdIoW/gYmv8AlU0sXOE
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c64110fe666bb36add67c2dce032404951ff0378f0aab3b4f1e63eeb9a69bf8a.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 368KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 219KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE