Behavioral task
behavioral1
Sample
94c07d959cb0968274347be40720808b2ec844002142fa5d0f046ca196b82d77.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
94c07d959cb0968274347be40720808b2ec844002142fa5d0f046ca196b82d77.exe
Resource
win10v2004-20221111-en
General
-
Target
94c07d959cb0968274347be40720808b2ec844002142fa5d0f046ca196b82d77
-
Size
446KB
-
MD5
6337bc4d344efe26983e1f145f742840
-
SHA1
a198dc3ee8029257873be738d474be074682880c
-
SHA256
94c07d959cb0968274347be40720808b2ec844002142fa5d0f046ca196b82d77
-
SHA512
3f25182db3aacf50b38208e56ad8f118fce3fe69ff806b5a087aa7b4787a05301a01c7f63b8848091b7e5f270ff5264aa506dd8d84c00ebaa973a32f568fe6bd
-
SSDEEP
12288:TjkArEN249AyE/rbaMct4bO2/VlT2ENaep9Uqe:YFE//Tct4bOsGmeqe
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
94c07d959cb0968274347be40720808b2ec844002142fa5d0f046ca196b82d77.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 588KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 263KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 147KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mjg Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lausqrb Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gda Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE