Behavioral task
behavioral1
Sample
b454a469bb0652cdece22056f0db82f4857f6aeb481ca73889e4a948573c13d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b454a469bb0652cdece22056f0db82f4857f6aeb481ca73889e4a948573c13d6.exe
Resource
win10v2004-20221111-en
General
-
Target
b454a469bb0652cdece22056f0db82f4857f6aeb481ca73889e4a948573c13d6
-
Size
100KB
-
MD5
09d79011dceafd36665a912fddd2b310
-
SHA1
cf84d1f4e6a00636b82c300442c8993aad1597c8
-
SHA256
b454a469bb0652cdece22056f0db82f4857f6aeb481ca73889e4a948573c13d6
-
SHA512
a70dd6c511e34dff1c8847b8b8d99ea98af764a8216404ccb1320f9f1abcc7b972f62827809bd2bea633314a44336e1549eeddc3074716b9466651d5720996b5
-
SSDEEP
3072:2jRSds4zb2SBMlyERlpBHsbBwBRWDf/p5BXou59:nds4zqSB6y0HQBwop5BXoy
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b454a469bb0652cdece22056f0db82f4857f6aeb481ca73889e4a948573c13d6.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 148KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 95KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE