Behavioral task
behavioral1
Sample
4f5912a61d75f34126a01894f02a79dc6bc6827c055a2afe20e35b078772cf14.exe
Resource
win7-20220812-en
General
-
Target
4f5912a61d75f34126a01894f02a79dc6bc6827c055a2afe20e35b078772cf14
-
Size
4.0MB
-
MD5
f4210ec5240c10dce02aef7a23a602c9
-
SHA1
0a30769a0d0e96c26205b4277793e164c9f6885d
-
SHA256
4f5912a61d75f34126a01894f02a79dc6bc6827c055a2afe20e35b078772cf14
-
SHA512
b6f67a9ea4ea85a6b3704cb3716d46c1fc6c544e43999ea45d83f068fe9dcd46bfd62a68325047ebaa01da9c629ba7c4a3a5ffd805fc9fcff5304594db95fa36
-
SSDEEP
98304:D6mT/rp+B9JCEMRwoTDN8F4Nu8jQZoVlU7o:DR/tcJiwoTDuF98jyqlU0
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4f5912a61d75f34126a01894f02a79dc6bc6827c055a2afe20e35b078772cf14.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE