Behavioral task
behavioral1
Sample
cd445f0dbf0e9ad468cafb5d066aba3ad3e643a6f40bce3e3ca182334e866d86.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd445f0dbf0e9ad468cafb5d066aba3ad3e643a6f40bce3e3ca182334e866d86.exe
Resource
win10v2004-20220901-en
General
-
Target
cd445f0dbf0e9ad468cafb5d066aba3ad3e643a6f40bce3e3ca182334e866d86
-
Size
84KB
-
MD5
92a49f7aff2ab3d5c34769b52b5c165d
-
SHA1
c22447534cb7b7c9deae0fbae056888696bb2f9f
-
SHA256
cd445f0dbf0e9ad468cafb5d066aba3ad3e643a6f40bce3e3ca182334e866d86
-
SHA512
7d06e6c4fadbf4230a24e074474b278545f70c57dc9037322b23a02130acf884f1c8c18d9e0d6d02d13bbfc492c4dfa09681c8ef382eda65602086c65bc189e6
-
SSDEEP
768:GUcCR6LiO9rUZ5P1vjFFVUn9Nx2RJyDaiHimfPgPceLpo0:GU8LiAOPNjFFVONSyicyLpo0
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
cd445f0dbf0e9ad468cafb5d066aba3ad3e643a6f40bce3e3ca182334e866d86.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE