Behavioral task
behavioral1
Sample
db64b3b41428a558586c978e36d834d4a20bc57158499dd92378641e995c66b8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db64b3b41428a558586c978e36d834d4a20bc57158499dd92378641e995c66b8.exe
Resource
win10v2004-20220901-en
General
-
Target
db64b3b41428a558586c978e36d834d4a20bc57158499dd92378641e995c66b8
-
Size
51KB
-
MD5
d6d595cef7cbadf069d942acabf61b2c
-
SHA1
596204a8df04ef19ac7852dd27dd3aa7d9a579a9
-
SHA256
db64b3b41428a558586c978e36d834d4a20bc57158499dd92378641e995c66b8
-
SHA512
d3e6c4a5ab4e1b04a9419002fa82527ab053107cdca3bbc3d76dcd6cee28c08b770fee1649a0abbccd0d00f1b10d99bd24b9e3c2c158fd96d872578a3438b186
-
SSDEEP
768:zwd3zBIHhzjBLJDQYxEoUKZ6+/lKioPmyK0kI2+9RCB31QNXLjQwqiR8ht:8dDBuzVJUKvkUHI2wCBGNb0w98ht
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
db64b3b41428a558586c978e36d834d4a20bc57158499dd92378641e995c66b8.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 164KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE