Behavioral task
behavioral1
Sample
14a436f1c21e6571adab3a0ac1e984e4341c89cab13f1c250bd98e9dd662139b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
14a436f1c21e6571adab3a0ac1e984e4341c89cab13f1c250bd98e9dd662139b.exe
Resource
win10v2004-20220812-en
General
-
Target
14a436f1c21e6571adab3a0ac1e984e4341c89cab13f1c250bd98e9dd662139b
-
Size
126KB
-
MD5
20871abea29801347929c6556a42633a
-
SHA1
af3355419054be16f4e5df8a117d89fb235d175a
-
SHA256
14a436f1c21e6571adab3a0ac1e984e4341c89cab13f1c250bd98e9dd662139b
-
SHA512
402dacf8f5dc442cd657bcfd45e89a227f12ad14c4c793d4d9681ce0ad2e21c21426c2e7c36d2dafc4bff43501a93d7e238b8e44bfd5dfa4f6c023e51047daad
-
SSDEEP
3072:PZYsqxqMKFMM17k82pqg1qAxcOCAhsxRJzhL5RCy6/CtP:PI/y7Vsqg1qrj5bJluy8CtP
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
14a436f1c21e6571adab3a0ac1e984e4341c89cab13f1c250bd98e9dd662139b.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 125KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE