Behavioral task
behavioral1
Sample
dc640bbfb9c94ac608a57671435198792ffe3b5a3537faae2faf2cf633cc3bab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc640bbfb9c94ac608a57671435198792ffe3b5a3537faae2faf2cf633cc3bab.exe
Resource
win10v2004-20220812-en
General
-
Target
dc640bbfb9c94ac608a57671435198792ffe3b5a3537faae2faf2cf633cc3bab
-
Size
169KB
-
MD5
e07f331adaaf6a04ce89c165e903dbb7
-
SHA1
3bc4da30af0201e95896149169313f4e70f62fef
-
SHA256
dc640bbfb9c94ac608a57671435198792ffe3b5a3537faae2faf2cf633cc3bab
-
SHA512
8751a556f4d68adb63e8be559dc7a246225acdbb17026d6ab9af371fd98f84bfa0976d900a72d6080587d15c370331afce786e28685f573ff6c57f293a90a7a6
-
SSDEEP
1536:QKfcXgh6D5ahwzwND7qh0umcHovWPXBkc8KRMgBv1eCjrO7aJLkh5c:QxSRue8Jm6XBcwGG
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dc640bbfb9c94ac608a57671435198792ffe3b5a3537faae2faf2cf633cc3bab.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 53KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE