Behavioral task
behavioral1
Sample
90aeeaf4ed439ca4d9aabeaa6e1b3ba4f021392b0e6fd062f65fc9c5efe3804c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
90aeeaf4ed439ca4d9aabeaa6e1b3ba4f021392b0e6fd062f65fc9c5efe3804c.exe
Resource
win10v2004-20220812-en
General
-
Target
90aeeaf4ed439ca4d9aabeaa6e1b3ba4f021392b0e6fd062f65fc9c5efe3804c
-
Size
33KB
-
MD5
4b49c3949e2999e75752c992c1138fc5
-
SHA1
00bde36a73f8fb8bf8eefc1b67625a8e39c2a299
-
SHA256
90aeeaf4ed439ca4d9aabeaa6e1b3ba4f021392b0e6fd062f65fc9c5efe3804c
-
SHA512
a95df3266887b3c4206e3388f7a8af9787821cdb930dee1eba3aa48c357829c061901dd0e1812ae4e8f421437fb600dea2cd7a7356205a07750539694c94c8aa
-
SSDEEP
192:h+kiOKHryGJH/zYvdVie+FKjjQRwhIDd/SemYEtxqcPN4Y5jwaaHUf7FnZMIQEgG:EkiOKHrd9cDivR81PeY+hM7OlFnX2R
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
90aeeaf4ed439ca4d9aabeaa6e1b3ba4f021392b0e6fd062f65fc9c5efe3804c.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE