Behavioral task
behavioral1
Sample
a4d5810ab097945ab5fa8402f34d4503c0408c082d4c11d72034b75dd226e6b5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4d5810ab097945ab5fa8402f34d4503c0408c082d4c11d72034b75dd226e6b5.exe
Resource
win10v2004-20220901-en
General
-
Target
a4d5810ab097945ab5fa8402f34d4503c0408c082d4c11d72034b75dd226e6b5
-
Size
469KB
-
MD5
6578e036e6ebe9e58ce969fd0fe5c7b9
-
SHA1
824793e5d283172499fc5ec45d9cbe582aa30056
-
SHA256
a4d5810ab097945ab5fa8402f34d4503c0408c082d4c11d72034b75dd226e6b5
-
SHA512
c42d4d75a23852791bec904027a0ff6ac5f763b3ec032b05bb809873e62f381f4804a4104767b445c7fe359a9ee46dd4a50bca1a8c42100c6debc36924cbe3ef
-
SSDEEP
12288:BD68LnJXKy1wAg7xi7FZcD7osGjZJW5I9:BBLn8we70RWDzEt
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a4d5810ab097945ab5fa8402f34d4503c0408c082d4c11d72034b75dd226e6b5.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 384KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 400KB - Virtual size: 400KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE