Behavioral task
behavioral1
Sample
4302404c84a375b13cef301ea1a3b3a2b5041aa64deee33312766f33cdc3b5f1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4302404c84a375b13cef301ea1a3b3a2b5041aa64deee33312766f33cdc3b5f1.exe
Resource
win10v2004-20221111-en
General
-
Target
4302404c84a375b13cef301ea1a3b3a2b5041aa64deee33312766f33cdc3b5f1
-
Size
131KB
-
MD5
dfcf7895252d7b752b75c65a0ea026d3
-
SHA1
90fa877e2c74f5bd23e2b04a9cb6bb237ffe56ba
-
SHA256
4302404c84a375b13cef301ea1a3b3a2b5041aa64deee33312766f33cdc3b5f1
-
SHA512
bc79f1d5a99f3e6fa5ea205072f7a91c7d46a70452a93f046b9e35241ad2cb861f39993303f1141dd976723b93568cbea2408d5920c701073c9af2812cd45630
-
SSDEEP
3072:NuH6MlW99if0Y46OjeZ8cTR8qeWg1mtaPx7vQ:MH65+01FjWFSqeh/Px7v
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4302404c84a375b13cef301ea1a3b3a2b5041aa64deee33312766f33cdc3b5f1.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 124KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
0 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE