Behavioral task
behavioral1
Sample
d78bb6b2684b841cbcffba8fc8e5448b112faeb617393d0cd2117cf94a2d7b19.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d78bb6b2684b841cbcffba8fc8e5448b112faeb617393d0cd2117cf94a2d7b19.exe
Resource
win10v2004-20221111-en
General
-
Target
d78bb6b2684b841cbcffba8fc8e5448b112faeb617393d0cd2117cf94a2d7b19
-
Size
718KB
-
MD5
56ea21d593c57095797ac79dc03bd4a7
-
SHA1
76d220d9af6e161b5642456ae9806c9e6007b665
-
SHA256
d78bb6b2684b841cbcffba8fc8e5448b112faeb617393d0cd2117cf94a2d7b19
-
SHA512
b419e3842b83564a1551b342712bb5f6006d3ad9a056adf4a6da6c9c4a28d57380fc0655ac43ab5ce2a18cdeb837108685c0b2da961a9399179be52ee90c3903
-
SSDEEP
12288:4eKrJJuf86AYcwo8oSAcNEMZMAFOVhEce7Zaxb7eInfX6Kt6supy3HZUvz30:4ruf/AfwKcLLFRHZaxb7eoKqZUvr0
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d78bb6b2684b841cbcffba8fc8e5448b112faeb617393d0cd2117cf94a2d7b19.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 456KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 242KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE