Behavioral task
behavioral1
Sample
b8461cd13af767d3b79c300874c10c2aec9a7c8d33632475caeefda46312c3c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8461cd13af767d3b79c300874c10c2aec9a7c8d33632475caeefda46312c3c0.exe
Resource
win10v2004-20220812-en
General
-
Target
b8461cd13af767d3b79c300874c10c2aec9a7c8d33632475caeefda46312c3c0
-
Size
313KB
-
MD5
91ae3c90b7e515b6bd77235c79b62b09
-
SHA1
1428f504339b7e415de0769ff3a5f42b83274663
-
SHA256
b8461cd13af767d3b79c300874c10c2aec9a7c8d33632475caeefda46312c3c0
-
SHA512
e99f8b8adf5a830606696abce878d4a69838091941bf75ee293b2b9be01f266938706f20981227fdf1080158226fd6246812424805d5a3a768a8b255ffcdb15d
-
SSDEEP
6144:rVI9tlBGNYHVC2ilcXbC/4J+014DpPPr3TQ0Uy2ZFK0qOXWFUmIxkZR0EKtzi:ridBGNYHVRrrz+u4DpHr9UK0qOXWgftz
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b8461cd13af767d3b79c300874c10c2aec9a7c8d33632475caeefda46312c3c0.exe windows x86
37864467a36d50fb91fb94ca0b7c38c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareFileTime
CopyFileW
CreateThread
DefineDosDeviceW
EnumResourceTypesW
GetCommConfig
GetConsoleWindow
GetDateFormatW
msvcrt
_mbccpy
_mbctombb
_mbsdec
_pctype
_snprintf
_snwprintf
shell32
SHLoadOLE
StrStrIA
DuplicateIcon
Sections
UPX0 Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 276KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE