Behavioral task
behavioral1
Sample
b40918805a324e88d6389deae9ef939274d3d3a693c48c0e4d799dcd8c16b93a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b40918805a324e88d6389deae9ef939274d3d3a693c48c0e4d799dcd8c16b93a.exe
Resource
win10v2004-20221111-en
General
-
Target
b40918805a324e88d6389deae9ef939274d3d3a693c48c0e4d799dcd8c16b93a
-
Size
7KB
-
MD5
227bca7514805727cb7bb005faf52810
-
SHA1
d0a540bbaab847a127b05bb1211f6645a91697e8
-
SHA256
b40918805a324e88d6389deae9ef939274d3d3a693c48c0e4d799dcd8c16b93a
-
SHA512
6ff23e96359e6fdec8c70142f2396be2412778f4e90bab3a5ab3b4091857a6fb3b299afc4f819af37657152edc0a0c513ba04b55187e5a2e442d03b99583f082
-
SSDEEP
192:Xhg+DfxLz0hkjbogFQDeCKSK+wC1/5fmpMcv8zq:XJVLQhtum5KSK+wC11mp8zq
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b40918805a324e88d6389deae9ef939274d3d3a693c48c0e4d799dcd8c16b93a.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE