Behavioral task
behavioral1
Sample
9b4ad3e0afd7773124ff01d50759815204874a1df4efebf15dadfc8284560e25.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b4ad3e0afd7773124ff01d50759815204874a1df4efebf15dadfc8284560e25.exe
Resource
win10v2004-20220812-en
General
-
Target
9b4ad3e0afd7773124ff01d50759815204874a1df4efebf15dadfc8284560e25
-
Size
228KB
-
MD5
b606e5b1c8ebee451cabfc89725f1696
-
SHA1
74794652f7f65525f26d833870fe88a3b316f55a
-
SHA256
9b4ad3e0afd7773124ff01d50759815204874a1df4efebf15dadfc8284560e25
-
SHA512
b966e3759e30d20d14c7b4384962049a0cb53dfa54b309215826fd97c73cfcf3fe3dd0f62610232ed033833f4fbfa3744782b14ec5d59223f8907f128a71b6ce
-
SSDEEP
6144:hMoShMfpH7A3Prxeo2z9whnQ4u68hJ1+:qoSYbA3P9AKu66J
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
9b4ad3e0afd7773124ff01d50759815204874a1df4efebf15dadfc8284560e25.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ols4gxfl Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
48v9zwwg Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5iddr6ag Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ