Behavioral task
behavioral1
Sample
c16b01a1f81f754486b08cf90b70b7cf0b8a3c6d593a04486ab750e3cde68721.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c16b01a1f81f754486b08cf90b70b7cf0b8a3c6d593a04486ab750e3cde68721.exe
Resource
win10v2004-20220901-en
General
-
Target
c16b01a1f81f754486b08cf90b70b7cf0b8a3c6d593a04486ab750e3cde68721
-
Size
329KB
-
MD5
1bf102fb31ae779cacb418b1cdff3c60
-
SHA1
1af48a92b2ab09d655f96470342a2c7dc30afe97
-
SHA256
c16b01a1f81f754486b08cf90b70b7cf0b8a3c6d593a04486ab750e3cde68721
-
SHA512
3af419a6e15af403344306ed03bcd39a410ae2a262b101a21b4ff7866131bf69e386e987830887c51c63d3cf5b3ebed162787955df7d9da0454af0583256a610
-
SSDEEP
3072:frSFhxp7xHSc7qzPKb/0at9ayXAVJlz0rpl:whxFxy8qeb/9zaw+zyp
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
c16b01a1f81f754486b08cf90b70b7cf0b8a3c6d593a04486ab750e3cde68721.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 72KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE