Behavioral task
behavioral1
Sample
4f0cf143f66ec9849d2af168cdb7a986638acfcbd9bb789c894ae2f769f388e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f0cf143f66ec9849d2af168cdb7a986638acfcbd9bb789c894ae2f769f388e1.exe
Resource
win10v2004-20220812-en
General
-
Target
4f0cf143f66ec9849d2af168cdb7a986638acfcbd9bb789c894ae2f769f388e1
-
Size
2.3MB
-
MD5
5f0485a63d642a0624bd62478f646a7b
-
SHA1
b635b87750817d3765bbdd1a221e40244048d681
-
SHA256
4f0cf143f66ec9849d2af168cdb7a986638acfcbd9bb789c894ae2f769f388e1
-
SHA512
d47e4e3d63195c4460115612d96361ec01e551483ea1e6aed1cc4b169d57117c11dcbb22af210467bd3002988e54a65311e3572a3ca87f297b35429b48601603
-
SSDEEP
49152:LWSG82RSUxp8BCfpyKA4aB7kQlr1q02cQ3cSRIUYXX9G7RmMH2GMVgc:xG4k/A4KrLQM44XktmMWGMVg
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4f0cf143f66ec9849d2af168cdb7a986638acfcbd9bb789c894ae2f769f388e1.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 92KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
XOR Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE