Behavioral task
behavioral1
Sample
991c998a4dbdcbe02092caaa832abb96631b78db7bc277279670b6620b2e74fe.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
991c998a4dbdcbe02092caaa832abb96631b78db7bc277279670b6620b2e74fe.exe
Resource
win10v2004-20221111-en
General
-
Target
991c998a4dbdcbe02092caaa832abb96631b78db7bc277279670b6620b2e74fe
-
Size
44KB
-
MD5
4eecc25dab1fd48fb67e12c1be8765ce
-
SHA1
3d26dca315aa9cd902a52e0394cf385f8628567d
-
SHA256
991c998a4dbdcbe02092caaa832abb96631b78db7bc277279670b6620b2e74fe
-
SHA512
3b05cc7b9c682b6f800fdc6b8a0ddd38beb72fbc94d38a0dcaf2d077950d8e4cbc9dad6da7872b8764104c63752cc420e2c6293308780c6c0b44669e45010b06
-
SSDEEP
768:csM4M0X6MLmc/0r3lvDFFy29K7yAiAe8RFlmQLsTChTQMqhUL:c74M0XB90r3NDD79cy3A7RFlvHhLH
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
991c998a4dbdcbe02092caaa832abb96631b78db7bc277279670b6620b2e74fe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yC Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE