Behavioral task
behavioral1
Sample
b4130d7dcfac48a43271c198b5cdc4c0ba9a148a63019a40bcf7db20a0a822d5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4130d7dcfac48a43271c198b5cdc4c0ba9a148a63019a40bcf7db20a0a822d5.exe
Resource
win10v2004-20220812-en
General
-
Target
b4130d7dcfac48a43271c198b5cdc4c0ba9a148a63019a40bcf7db20a0a822d5
-
Size
19KB
-
MD5
f0ef4396246a3760ff3ba3c21cff0b5c
-
SHA1
9b205fafebbd846b02c4b1f383039257fd94ae29
-
SHA256
b4130d7dcfac48a43271c198b5cdc4c0ba9a148a63019a40bcf7db20a0a822d5
-
SHA512
e55c8aae2b64262ed97ba50a09fef29fdbca06a4934405fa03593010fd933334e2903abd1e4808f570a82a9684e6decfb56b6148b8de75ec7ea127809aa4c612
-
SSDEEP
384:qw4VGlwmBBO1IfXxZxyNVyTI7Uhy150stQ9UyMaNJawcudoD7Uj27P:9mmBIIfDcVj15vcFnbcuyD7UQ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b4130d7dcfac48a43271c198b5cdc4c0ba9a148a63019a40bcf7db20a0a822d5.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE