Behavioral task
behavioral1
Sample
0daa095a350da1914049d6a86850a93526e749fb7f57c0cd06433f75a9174757.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0daa095a350da1914049d6a86850a93526e749fb7f57c0cd06433f75a9174757.exe
Resource
win10v2004-20230220-en
General
-
Target
0daa095a350da1914049d6a86850a93526e749fb7f57c0cd06433f75a9174757
-
Size
2.5MB
-
MD5
128de735d9916485b78dafbaaaefe96f
-
SHA1
a39356233f3a93918b4f8c5d15ed3cc1dd2ab8c7
-
SHA256
0daa095a350da1914049d6a86850a93526e749fb7f57c0cd06433f75a9174757
-
SHA512
13ec592fa15e2040ae943b5caf5f3f8229a947a6dca4421038cf1685d6242de5dec8eeea6afe88742c331a245e84a1ade7d3689f7c7b23f9d3dae292a6a601f3
-
SSDEEP
49152:hoOt+PrivfYla9apc7E0zXYATeHIxGt0wWSSSod1wGs2STF5yGaBthYVqM8KHojh:BOg6a9apc77XjVM0N3SKwG1q2WqM8KIF
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
0daa095a350da1914049d6a86850a93526e749fb7f57c0cd06433f75a9174757.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE