Behavioral task
behavioral1
Sample
b4c762e7ef9dc363ade3d1688c4802a3c21f961d013dcc744bd494d52183f6db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b4c762e7ef9dc363ade3d1688c4802a3c21f961d013dcc744bd494d52183f6db.exe
Resource
win10v2004-20220812-en
General
-
Target
b4c762e7ef9dc363ade3d1688c4802a3c21f961d013dcc744bd494d52183f6db
-
Size
27KB
-
MD5
dc9d9bab75ee134814d5ec4226987302
-
SHA1
175a7547f0d584dd8f5e85ff5366cc484642ae8a
-
SHA256
b4c762e7ef9dc363ade3d1688c4802a3c21f961d013dcc744bd494d52183f6db
-
SHA512
1a35d63d2182df4cc3231bf89346e8b4fc65ce0346b21ba6a897431385d8a9b1ee6867cbde7e27bb4742df711c7c7b9ef6d9c0254200f72370c9b06ac7430da6
-
SSDEEP
768:q+F+DRM4YMiqKJbPM11fc/lGow37m1YIgFRa6oR+:qVDSbvJw1K/6Sl
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b4c762e7ef9dc363ade3d1688c4802a3c21f961d013dcc744bd494d52183f6db.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE