Behavioral task
behavioral1
Sample
c42ef10dff41b06c4f399012f4d8bcc6e5b610a057b95998a01b85c8826eae5b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c42ef10dff41b06c4f399012f4d8bcc6e5b610a057b95998a01b85c8826eae5b.exe
Resource
win10v2004-20220812-en
General
-
Target
c42ef10dff41b06c4f399012f4d8bcc6e5b610a057b95998a01b85c8826eae5b
-
Size
223KB
-
MD5
9f797127479358e0f816454fb06e17af
-
SHA1
89dddd3a70b8fc891ab8445ed616b293ff18b843
-
SHA256
c42ef10dff41b06c4f399012f4d8bcc6e5b610a057b95998a01b85c8826eae5b
-
SHA512
3280e6b8b19307af1420ef391e4985f1674234b412e58a8780d7f38eb5b258e01ff6351182ed5c8fd703378bd7e402bf62401121d88b0373257c9741a2f1e9b5
-
SSDEEP
3072:jGZCbYLBXUiCkSzdprk5dSMgQ4EyTvq5qnZanS98F0eXnAgwCSrI2xu5qbS05w:jGZCsLBKknSUGEqZn8F0eXAgwCqIKbS
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c42ef10dff41b06c4f399012f4d8bcc6e5b610a057b95998a01b85c8826eae5b.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE