Behavioral task
behavioral1
Sample
Windows Loader.exe
Resource
win10v2004-20220901-en
General
-
Target
Windows Loader.zip
-
Size
1.7MB
-
MD5
3dbee5cc74973c345ecdb689de61e58d
-
SHA1
e66370d9395282dc3b55c24e774daae8fe19caa1
-
SHA256
1baa2783cf63b75143fbbd873284e5d9c0cc4de5d6603b1d9ffe0890c3b28890
-
SHA512
cd1fe2f3fab7848586b201d14ab24b21bdaea77ed10d6b6691e0c5324e88396ea31813fa121bfa1b1d3b764153caf6fa71bcc0e48a313c58007f9048940e92de
-
SSDEEP
24576:3hePtVqWaoUGIqLtDDEzj9saOAHTjaUZt+YeKAee/Y0vbOWGoQsnlwF92uOqEnO9:xk0iDE9sZAzR+LKA3fOWG4lwFgPHOYK
Malware Config
Signatures
-
resource yara_rule static1/unpack001/Windows Loader.exe upx
Files
-
Windows Loader.zip.zip
-
Keys.ini
-
Read me.txt
-
Windows Loader.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 577KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
checksums.md5