Behavioral task
behavioral1
Sample
c0150733b4c2ee989f7dd4367c24f7948c3d5f858cdc3c1c3219776b7684caf6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0150733b4c2ee989f7dd4367c24f7948c3d5f858cdc3c1c3219776b7684caf6.exe
Resource
win10v2004-20220812-en
General
-
Target
c0150733b4c2ee989f7dd4367c24f7948c3d5f858cdc3c1c3219776b7684caf6
-
Size
473KB
-
MD5
0855b46a40a58077883baec97335be50
-
SHA1
cc06630772af3d7eb8921625dda9db68b80a142f
-
SHA256
c0150733b4c2ee989f7dd4367c24f7948c3d5f858cdc3c1c3219776b7684caf6
-
SHA512
dd62065c9e823c7b235f9d09da74c3de699b2e9ae147334a2a60918e1b4b7b1fe4c323ec12beabb0da418018d2ed2d49335a3dc0ebab9e6198bd8331181ef1fd
-
SSDEEP
12288:ynNhuBoY8SorxgmA+nlvVlgYNX3O8ANs0VOdq3c+XYY:yPatCg7EPl3O84s0VL3XJ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c0150733b4c2ee989f7dd4367c24f7948c3d5f858cdc3c1c3219776b7684caf6.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 364KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE