Behavioral task
behavioral1
Sample
ba2a0ef922a3bcb43872e0dfbdc82a79ec823d7eaaf510f3314e8098f8bf508f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ba2a0ef922a3bcb43872e0dfbdc82a79ec823d7eaaf510f3314e8098f8bf508f.exe
Resource
win10v2004-20220812-en
General
-
Target
ba2a0ef922a3bcb43872e0dfbdc82a79ec823d7eaaf510f3314e8098f8bf508f
-
Size
394KB
-
MD5
0ae53bf61ecba663cc22f8db46309f57
-
SHA1
bf882a559fe094966735788e0975df46ecc5cd4c
-
SHA256
ba2a0ef922a3bcb43872e0dfbdc82a79ec823d7eaaf510f3314e8098f8bf508f
-
SHA512
ee7298099c44043e5994561c46e2f8b0546d6ec8e12c555a8852a8d4c94986487f0cd382ff4ca96d70ccd70b95cb77fbd0ffd0fb6b655d4ad74b166066d45709
-
SSDEEP
6144:duHIU3SCXOM31Gs48xmj0sFNJL+4llc+e77JHTlA:coUi831MjnpTlSrlTm
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
ba2a0ef922a3bcb43872e0dfbdc82a79ec823d7eaaf510f3314e8098f8bf508f.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 376KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 168KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DUPX1 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE