Behavioral task
behavioral1
Sample
6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe
Resource
win7-20220718-en
General
-
Target
6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068
-
Size
4.0MB
-
MD5
5b07b328013bb904ffbd6aff6032ec74
-
SHA1
347bd61eb0fd12bee4990e234b848a4a936a72b8
-
SHA256
6c21057b47f4b84990aae1a7039621fc3c0bdebdbe3ea2685b6d1f15134cb068
-
SHA512
55e15259da0a06d311821a7cc88079bdc6ac23567e42c4348509846faa56e29b812845ddac7124b29db45409856d7f132a8ed0ec7b2cccf1f4f846c1e37dfe23
-
SSDEEP
98304:BfkY0ONsPXKTHnFsTeZ+6N5mYiMuG5nSvBZPBE6MyfbFNBuVG:mQUACTeTwYpnG7BE6FFNBu
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE