Behavioral task
behavioral1
Sample
6d9961f214febf0f6b8a363b6407fef6a7f1a636122c0514ee557d5b4db188d8.dll
Resource
win7-20221111-en
General
-
Target
6d9961f214febf0f6b8a363b6407fef6a7f1a636122c0514ee557d5b4db188d8
-
Size
123KB
-
MD5
7b6da33120f78315752051aa4bc219a0
-
SHA1
0f8b01f9eeae71941b8e36560a42d46f563bc5e0
-
SHA256
6d9961f214febf0f6b8a363b6407fef6a7f1a636122c0514ee557d5b4db188d8
-
SHA512
f57cc28aec2541fef902eef12a14132364e07bcedd79ab5c13925c3b5e23fac5e14f5d2a07b8d14e4894e14bda5915abaa27778ea59897f98dd397173d3adad1
-
SSDEEP
3072:x65P04yvYKC5CpCuLZuz0VxS3gwVP2JDGY:xI9KC5900ik3tVEGY
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6d9961f214febf0f6b8a363b6407fef6a7f1a636122c0514ee557d5b4db188d8.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE