Behavioral task
behavioral1
Sample
cd0fb351c48ff13a878ca50a22fbfdba99556a857bbe84dbf61be695277356c1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cd0fb351c48ff13a878ca50a22fbfdba99556a857bbe84dbf61be695277356c1.exe
Resource
win10v2004-20221111-en
General
-
Target
cd0fb351c48ff13a878ca50a22fbfdba99556a857bbe84dbf61be695277356c1
-
Size
246KB
-
MD5
b4a423a8d15c973e34dddce878373921
-
SHA1
1bc4889c076fc284d05652e5cbb65703a6d56165
-
SHA256
cd0fb351c48ff13a878ca50a22fbfdba99556a857bbe84dbf61be695277356c1
-
SHA512
819e8b7b8f718722f629e36b11406ab0c2be98f4691f647cb95671b1c6792a340317af8a9f5ce94812a327ca6b5ee55707a4a8d20e2e950dd2aea4eff19c8328
-
SSDEEP
6144:Ib7jL7SPwhOv/eS2VpZBxZEAUtq5Ad2sM4:Ib7jL2P6UivZBxqZq5t4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
cd0fb351c48ff13a878ca50a22fbfdba99556a857bbe84dbf61be695277356c1.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 108KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.oli Size: 67KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
clatbfo Size: 80KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hlqsija Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE