Behavioral task
behavioral1
Sample
dc60bb08b559d26219e541db81444b0119547dfb9b21573215c17bbf4b64dfcd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc60bb08b559d26219e541db81444b0119547dfb9b21573215c17bbf4b64dfcd.exe
Resource
win10v2004-20220901-en
General
-
Target
dc60bb08b559d26219e541db81444b0119547dfb9b21573215c17bbf4b64dfcd
-
Size
27KB
-
MD5
90ce050798a9faa336fb9e0b4d6e915e
-
SHA1
b665d14d0e3db92fd92fee6dd27dcfe9a25da09e
-
SHA256
dc60bb08b559d26219e541db81444b0119547dfb9b21573215c17bbf4b64dfcd
-
SHA512
956fce8fc0cbb498a86c3d8049799ec6dc1e25e029c01e9eb55b2551bf18b1c3d73ae3e8ba46d2cf18965a078bb40551eb1af05d3167ac715584af4a0e27d43c
-
SSDEEP
192:/TW8rOP3RD3K6Nd5N5ff8umNWp5X3Qxshzwpe5cDW0:/TW6I3K6d5N5vmsbnesqDW0
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dc60bb08b559d26219e541db81444b0119547dfb9b21573215c17bbf4b64dfcd.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE