Behavioral task
behavioral1
Sample
c870f8b1aefb1cb3738225d31398056a62478e2a3b50ca75afd55a16ebc45a91.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c870f8b1aefb1cb3738225d31398056a62478e2a3b50ca75afd55a16ebc45a91.exe
Resource
win10v2004-20221111-en
General
-
Target
c870f8b1aefb1cb3738225d31398056a62478e2a3b50ca75afd55a16ebc45a91
-
Size
246KB
-
MD5
a17d465bed6bba493f5a21b067b688e9
-
SHA1
402e548c76634b021604e7472bb5b14543591626
-
SHA256
c870f8b1aefb1cb3738225d31398056a62478e2a3b50ca75afd55a16ebc45a91
-
SHA512
90cef0efb54a8e1472b401faf051a9f83e9ce603c7395aa3794da10c2870e74a3dc0ae7b7acb5d2cdf7164cc8ef2f83861e6e9dac149cf2a9594282b2254d45b
-
SSDEEP
6144:yuMJWY+qaHEQCcYfSBYJbQCjRcqESEgms8Anhc1kG6EvyS:y+YcUc6SBLLTSEgWAnhc1kGH
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c870f8b1aefb1cb3738225d31398056a62478e2a3b50ca75afd55a16ebc45a91.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 368KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 217KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE