Behavioral task
behavioral1
Sample
f86d06c31e376e814aaf5308cd4a1fc1a48bb6c4b0afca8944d598f90405ea59.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f86d06c31e376e814aaf5308cd4a1fc1a48bb6c4b0afca8944d598f90405ea59.dll
Resource
win10v2004-20221111-en
General
-
Target
f86d06c31e376e814aaf5308cd4a1fc1a48bb6c4b0afca8944d598f90405ea59
-
Size
222KB
-
MD5
fa9663912da68be8eab415b8db162810
-
SHA1
0b39ef7ceab2ba8b236267af27b423d0961a6c3c
-
SHA256
f86d06c31e376e814aaf5308cd4a1fc1a48bb6c4b0afca8944d598f90405ea59
-
SHA512
ec55d81ee7a8d098f07c2f0387d97aa1d397d182feb439e5c6da574f611a747eb52d13dc9fea639926dc1d9e8085edb13856d8d7ca7a6cb1fd2df2385cd908f6
-
SSDEEP
3072:cCLg6XKQVCYq7lMstkhfhP+9mkrM6outrh:taqqRWhl6oS1
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f86d06c31e376e814aaf5308cd4a1fc1a48bb6c4b0afca8944d598f90405ea59.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE