Behavioral task
behavioral1
Sample
b00a357ad4a7361133dbb2e4ea6366671865bc7a9c11955d7c88709231344f20.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b00a357ad4a7361133dbb2e4ea6366671865bc7a9c11955d7c88709231344f20.exe
Resource
win10v2004-20220812-en
General
-
Target
b00a357ad4a7361133dbb2e4ea6366671865bc7a9c11955d7c88709231344f20
-
Size
489KB
-
MD5
13dbb34740f4fc403d77299bc338048e
-
SHA1
ea0bf8c241b0ae1c4860c3262665b6f0e3a3863f
-
SHA256
b00a357ad4a7361133dbb2e4ea6366671865bc7a9c11955d7c88709231344f20
-
SHA512
713cfa95d43d311eb02ddb30101656c47a8f6802676ad02d3be505b0c93779f3978db48ee575da15a5b1c554a64096cfa6ecf1cbf6fb4256ff2351edfcb8aae5
-
SSDEEP
12288:L1QMIIEHUilIfFU6BmaBeM86JEblJfOoiLi5oS:LOMIhRK1peyJKy
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b00a357ad4a7361133dbb2e4ea6366671865bc7a9c11955d7c88709231344f20.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 312KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 481KB - Virtual size: 484KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE