Behavioral task
behavioral1
Sample
e07a05ebbb01755cad4b09e3035317bca40ab3cf44729e8003ba57c76400ac82.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e07a05ebbb01755cad4b09e3035317bca40ab3cf44729e8003ba57c76400ac82.exe
Resource
win10v2004-20220812-en
General
-
Target
e07a05ebbb01755cad4b09e3035317bca40ab3cf44729e8003ba57c76400ac82
-
Size
99KB
-
MD5
49ebd85071e550b9b897b793c74e2082
-
SHA1
5ac8a5a56e60d844c1cccacbdeccf02865cb8fd1
-
SHA256
e07a05ebbb01755cad4b09e3035317bca40ab3cf44729e8003ba57c76400ac82
-
SHA512
ad26f879d090f781c188376f0ef202c2c79959c1c46f6828530ddbc7b429a8c46f5daedf40645d0be3f9ed2c8d48b40e4180c8308b143ace05c6e906a87152e8
-
SSDEEP
3072:BBSMZen3xhaL+gwpKO9RlY6s9Ov7N8UMy0WauF:bSvfaiay0uF
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e07a05ebbb01755cad4b09e3035317bca40ab3cf44729e8003ba57c76400ac82.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
�PX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 16KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE