tmodkm
Behavioral task
behavioral1
Sample
eb3744c90bac5e739f10db7b87f9e057a4619545cb1739186e6a903cf5ed1170.dll
Resource
win7-20221111-en
General
-
Target
eb3744c90bac5e739f10db7b87f9e057a4619545cb1739186e6a903cf5ed1170
-
Size
250KB
-
MD5
72c0e31fe24d3670e3524b1052d5901d
-
SHA1
d244f274d7eeaad705947aad904710e63ccb12ef
-
SHA256
eb3744c90bac5e739f10db7b87f9e057a4619545cb1739186e6a903cf5ed1170
-
SHA512
a00942d0dd6b198c8e3d0a3122b29efc4afb800e3762e86ff1e12a2627157c869165042439fd76b49ada0e6d2d6a1e31fb67e45cc677612686251e72226fa728
-
SSDEEP
1536:57ylSIw89JBYJ6lhogqZsZd1nFHF40HkpZMyIR:5cSIjqkF3Zj1HkpO
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
eb3744c90bac5e739f10db7b87f9e057a4619545cb1739186e6a903cf5ed1170.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE