Behavioral task
behavioral1
Sample
a40d86ddfb13b673a01f6801a9b0d6609cc897dffbaaac7be37d8f1ad90ca7b2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a40d86ddfb13b673a01f6801a9b0d6609cc897dffbaaac7be37d8f1ad90ca7b2.exe
Resource
win10v2004-20221111-en
General
-
Target
a40d86ddfb13b673a01f6801a9b0d6609cc897dffbaaac7be37d8f1ad90ca7b2
-
Size
171KB
-
MD5
3a217271848f63f6e142cc0e33a9298f
-
SHA1
f517d1338baf151481ac49ea1573c611da58ccd4
-
SHA256
a40d86ddfb13b673a01f6801a9b0d6609cc897dffbaaac7be37d8f1ad90ca7b2
-
SHA512
732ba2343e0354a3e18a534a33ca7288c9a4fd2de034a84fc7f3d238e59fe29946b2e25c013624ca55155b0a8290576b58255afc39404c528fc9829ff0aa1b64
-
SSDEEP
3072:ku45GsDsjRBxVQPBNMqr7N9yh3ks4bYQUzatVFpkl5XwuR99D1svDXuhtdBqAaVD:klUQLjSh3lMBpGR9VIXutAAaDvoS7
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a40d86ddfb13b673a01f6801a9b0d6609cc897dffbaaac7be37d8f1ad90ca7b2.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 96KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 167KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE