Behavioral task
behavioral1
Sample
a0f34f4c57adc4e75beb36c54f1112b333f3b139f06144d5931153220ac91918.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0f34f4c57adc4e75beb36c54f1112b333f3b139f06144d5931153220ac91918.exe
Resource
win10v2004-20221111-en
General
-
Target
a0f34f4c57adc4e75beb36c54f1112b333f3b139f06144d5931153220ac91918
-
Size
526KB
-
MD5
dad5ee9738bfb7be179db1d54406cf99
-
SHA1
c82775e7ebdfb3274b80eb20c3bd4d3cd002ff61
-
SHA256
a0f34f4c57adc4e75beb36c54f1112b333f3b139f06144d5931153220ac91918
-
SHA512
e3ea43dcc87508792b348888ed72f207659699e14fb6b7cf2c4f1f5a94a15e3b8d8b3b37971432f8d4c7fabbf8ec58482931e4850ea3ba255ebe4ce626c53c96
-
SSDEEP
6144:cuHDS0RiAOI0GOAus4UYB8ODg5NtP+AVqRi9E89YqtpiurC2FQg0LYUKmcxVIdh0:3HDSSiATyTUYBSNrIYV9BGurdmvsUgP
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a0f34f4c57adc4e75beb36c54f1112b333f3b139f06144d5931153220ac91918.exe windows x86
fdbfec85672f73d2a4d49635454936d4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
ExitProcess
user32
MessageBoxA
Sections
UPX0 Size: - Virtual size: 472KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 282KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
KK Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.perplex Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE