Behavioral task
behavioral1
Sample
2dff2fb200ea47a245cebc2dee72f595e30957b59725bdbca8cdc3225a449a72.exe
Resource
win7-20230220-en
General
-
Target
2dff2fb200ea47a245cebc2dee72f595e30957b59725bdbca8cdc3225a449a72
-
Size
83KB
-
MD5
bd3c295ce6e20d9f10fcfd093732bb11
-
SHA1
55c2d80f459fc9c4b4562ff837c437894cbd7284
-
SHA256
2dff2fb200ea47a245cebc2dee72f595e30957b59725bdbca8cdc3225a449a72
-
SHA512
f74e977621c3a64bc4da87e557b278be6cfcd40fad1befe4ea2970bd366cda3f5cd746cae44e4d525e968b8f939b9978a65d424ea59f0ba2af2e65e4b2894f60
-
SSDEEP
1536:a94OZH9ziYXyeM2enykKXbFsv7EVqOjPNQ70dW9KRTBKKjncHnouy8dl:2HdGYlMixZsDAqOjPN/cKRTB1cHoutr
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
2dff2fb200ea47a245cebc2dee72f595e30957b59725bdbca8cdc3225a449a72.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 136KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE