Behavioral task
behavioral1
Sample
09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe
Resource
win7-20220715-en
General
-
Target
09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB
-
Size
4.0MB
-
MD5
7bfa990e3d835cd08e29168d6184cd6c
-
SHA1
a37e6a762885a86bcd5d56ed5aca2dab021fde60
-
SHA256
09d9f55cefa3dff5ef3ff5ec3ca7500db225fd6e56bfe278ba6907c16b6c79cb
-
SHA512
206bdcc26c95ca0407c3c922db45ccccda9630126e45b36f1a9ae5a3dece793f18e7fd1279c0f4f097791cfdace74ac75aef937381b229c050ee3841834772a0
-
SSDEEP
98304:kTJ3/XmpmhakBhiX9IKW201c2g7D6deUTCYJA/dxev:kVvXfh4yd2B+
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE