Behavioral task
behavioral1
Sample
f83b9f91e6d12297b9c4819a2791e9f9cbe1e5e06b016a21cbd21eb47c39c715.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f83b9f91e6d12297b9c4819a2791e9f9cbe1e5e06b016a21cbd21eb47c39c715.exe
Resource
win10v2004-20220812-en
General
-
Target
f83b9f91e6d12297b9c4819a2791e9f9cbe1e5e06b016a21cbd21eb47c39c715
-
Size
64KB
-
MD5
2321cd5bd3e11ee7ed124a0b79401656
-
SHA1
6e9e262ee7601fa4ef38c78969431fad0e928000
-
SHA256
f83b9f91e6d12297b9c4819a2791e9f9cbe1e5e06b016a21cbd21eb47c39c715
-
SHA512
c2d805d84182a3abd4d2297329b34d7a275b1a1686d74d2b1057520bd4de373721c0a7cfe6b5ab8cc66dea82c4ec6cd730edaca1f37ffe20527daf3f6d2471a6
-
SSDEEP
1536:iUPBmpJw0ZeGIGBOteyN0LbEmlx/0a11tqhpfK+UD:iU5mPw0Z6s1Lgmlaa11ghQt
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f83b9f91e6d12297b9c4819a2791e9f9cbe1e5e06b016a21cbd21eb47c39c715.exe windows x86
67fdc237b514ec9fab9c4500917eb60f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
Sections
UPX0 Size: - Virtual size: 108KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1st Size: 512B - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE