Behavioral task
behavioral1
Sample
4b42a0dec155eda82f8788c9d4449496c2dddd0133176987397acb0a3563a7e9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4b42a0dec155eda82f8788c9d4449496c2dddd0133176987397acb0a3563a7e9.exe
Resource
win10v2004-20221111-en
General
-
Target
4b42a0dec155eda82f8788c9d4449496c2dddd0133176987397acb0a3563a7e9
-
Size
257KB
-
MD5
9f740d5b989c8ac610b36d8a84dfb901
-
SHA1
051f5fa82599e0468314e72f7ce651a5bbc6c97f
-
SHA256
4b42a0dec155eda82f8788c9d4449496c2dddd0133176987397acb0a3563a7e9
-
SHA512
4c15ae11af75685fcaa0422e77bfa7959f8878f73abd36be346ff4fc836e4ec561ba55ca99fe0df08f4910e76ea1ad41ac7742bdaaf6d7c12b7118050e3757e7
-
SSDEEP
6144:ZmWWGs8o+uyZIcEmLkuEkVJlcxoOzVHvRiAbxfloazIPB3FKCFQ0:Zm9u3uyImLkEVJyTlZxtNudFKn0
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4b42a0dec155eda82f8788c9d4449496c2dddd0133176987397acb0a3563a7e9.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 396KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 247KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.LWY Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE