Behavioral task
behavioral1
Sample
2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe
Resource
win7-20220718-en
General
-
Target
2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6
-
Size
4.0MB
-
MD5
ea914f2309b04f7a061e41cccaa95b20
-
SHA1
d251f0ed55f5bcf928d5290e80d2551bc267a47c
-
SHA256
2844e85a36a29a037eaf1273133b7a83f65c6db637443568703f0052dc7cb1c6
-
SHA512
72129505f858d29bfe3751a1023a6618e2c22665d190dec7c3f89d81a7aa829a2837c32dd5959f92dbe2349d761521b73be2ec1480a14393b69d0f421582f03e
-
SSDEEP
98304:2MyqrmCQHoreoTsTmkGg127/LfvcArtO10knVRPr+znIHEgTjXo4NP9K:ZNQlzmg27/jkmtERPr+ANfXo4b
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE