Behavioral task
behavioral1
Sample
df0ccac32a4fb2f6608e4b6ef96d31e11bdb722f50760b30872c5f2a03acb635.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df0ccac32a4fb2f6608e4b6ef96d31e11bdb722f50760b30872c5f2a03acb635.exe
Resource
win10v2004-20221111-en
General
-
Target
df0ccac32a4fb2f6608e4b6ef96d31e11bdb722f50760b30872c5f2a03acb635
-
Size
32KB
-
MD5
2c67e24f300b1cd13777cddb57c66959
-
SHA1
bb05fe34d9632a62abc1b4084ece4e1ac40de6db
-
SHA256
df0ccac32a4fb2f6608e4b6ef96d31e11bdb722f50760b30872c5f2a03acb635
-
SHA512
b57b87d5973f76e623c5099801e4bd045042c24da15e6d99fea311f9cc5846f2aa666f00b5623aa9a1bbfdd42b05828f07e1eb423f1a7588edd4a07b39797864
-
SSDEEP
768:exBJFMMCeGMB7JnbcuyD7UpGVL7RjifPl:evMMCeGMB9nouy8pGVL7Re
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
df0ccac32a4fb2f6608e4b6ef96d31e11bdb722f50760b30872c5f2a03acb635.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE