Behavioral task
behavioral1
Sample
d9d30b63e909719113721eb7263d2de02b70cc9b5e192d0434296611f68af383.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9d30b63e909719113721eb7263d2de02b70cc9b5e192d0434296611f68af383.exe
Resource
win10v2004-20221111-en
General
-
Target
d9d30b63e909719113721eb7263d2de02b70cc9b5e192d0434296611f68af383
-
Size
1.1MB
-
MD5
2aec70f2290f449742a3d3a4668fcf46
-
SHA1
9ca3eb641a70e59e1b65cf7213c145e61005c8c7
-
SHA256
d9d30b63e909719113721eb7263d2de02b70cc9b5e192d0434296611f68af383
-
SHA512
b8d3f7301c04887b9a2f59bf840fb61ccac703803e2084b574a48d45b5427013a92bee90880862c0b7d92d1af16dfe06caebc421ea44f302259d3c6a69672df9
-
SSDEEP
24576:LFR+MZZaO5GDK+jKQG8G8ViwRdsBbS6i4lim4myYhK9:LvFPaOMOgK38HRdiQF9X
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d9d30b63e909719113721eb7263d2de02b70cc9b5e192d0434296611f68af383.exe windows x86
b2cbcb43121558afe3335b20ab8ddf54
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord541
kernel32
GetModuleHandleA
LoadLibraryA
VirtualAlloc
GetModuleFileNameA
ExitProcess
user32
MessageBoxA
Sections
.text Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
.UPX2 Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ