Behavioral task
behavioral1
Sample
d924b896bd654b4b33abd99b9c66a3289fc05b9376be088a483c7d7a22fc9a6e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d924b896bd654b4b33abd99b9c66a3289fc05b9376be088a483c7d7a22fc9a6e.exe
Resource
win10v2004-20221111-en
General
-
Target
d924b896bd654b4b33abd99b9c66a3289fc05b9376be088a483c7d7a22fc9a6e
-
Size
194KB
-
MD5
6b7e2b3a39291649b2290ca413924a59
-
SHA1
4ed4378bb472922952aef2eacece0fceede19c63
-
SHA256
d924b896bd654b4b33abd99b9c66a3289fc05b9376be088a483c7d7a22fc9a6e
-
SHA512
01c2af1007939ebde08bdc747e17465b3e49b39b659ef26b96bc1745129fb1f498f6f7cabdfd0698b3661742154d2b341385d11949c78940901715110f8f9892
-
SSDEEP
3072:eqXED6NTzy4TXvOGddlKsIRKFZjKPmc04NHX+tonjYAX/qlqIR8:MGNnt28vKhsUR+tocAPq4IR
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d924b896bd654b4b33abd99b9c66a3289fc05b9376be088a483c7d7a22fc9a6e.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 187KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE