Behavioral task
behavioral1
Sample
b0b6abaa26eaff7919817339af0beb3dabe7ac430844208455aad99ed46cb8af.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b0b6abaa26eaff7919817339af0beb3dabe7ac430844208455aad99ed46cb8af.exe
Resource
win10v2004-20220812-en
General
-
Target
b0b6abaa26eaff7919817339af0beb3dabe7ac430844208455aad99ed46cb8af
-
Size
105KB
-
MD5
30d00700117e1f24f6ffc1fb3695f657
-
SHA1
8e1007eddde22c0ca043fefdfd1c8cfbb268e21e
-
SHA256
b0b6abaa26eaff7919817339af0beb3dabe7ac430844208455aad99ed46cb8af
-
SHA512
e8aee4be632bbe775451614d2d7cad1a887f783ac60d325f66780c575ecbf8ee1ec576d780e509941bd5273137b0c5a54f68c39fdfafc325652639261996c3c8
-
SSDEEP
3072:cUPz3bKIDJofjswlZrHO7cA2DIUFQiKojOJ9ou5g:XjbEfjq03FQWs9oy
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b0b6abaa26eaff7919817339af0beb3dabe7ac430844208455aad99ed46cb8af.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 164KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 102KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rol Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE