Behavioral task
behavioral1
Sample
c0a5eb971d9cc525c8b0ed0893fcae0aca9102b33f6f2715b17f5d196fb01a4c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c0a5eb971d9cc525c8b0ed0893fcae0aca9102b33f6f2715b17f5d196fb01a4c.exe
Resource
win10v2004-20221111-en
General
-
Target
c0a5eb971d9cc525c8b0ed0893fcae0aca9102b33f6f2715b17f5d196fb01a4c
-
Size
259KB
-
MD5
0bfa4742fd9b880c0d00ba4ae298fa2e
-
SHA1
bcb197967142d437b6d41a1b47da11b8513b203c
-
SHA256
c0a5eb971d9cc525c8b0ed0893fcae0aca9102b33f6f2715b17f5d196fb01a4c
-
SHA512
2af0915c47d141764fa280e12fb163a4a9de246257ad306b6013905eeabe6e9a43ae6b0ee1e6c0caa978ed740ee7bef681ea1306316d77f28a55a6b3cbe7e16e
-
SSDEEP
6144:GMmCONdI6znSQQWnV4uga2sEh2xxlMC+im:Fx56j5bnVras6oIC+f
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c0a5eb971d9cc525c8b0ed0893fcae0aca9102b33f6f2715b17f5d196fb01a4c.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 236KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 203KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE