Behavioral task
behavioral1
Sample
02fbc16f240023c0ad872ec1c28ca213d5fdc8bf1d8731e2fbee5f88da56bfa6.exe
Resource
win7-20220812-en
General
-
Target
02fbc16f240023c0ad872ec1c28ca213d5fdc8bf1d8731e2fbee5f88da56bfa6
-
Size
4.0MB
-
MD5
8b5dfbceeb3cc80ced3a6e43e6e45307
-
SHA1
cd10c62afd118ee6dbdea28df5676b18ed0b9af6
-
SHA256
02fbc16f240023c0ad872ec1c28ca213d5fdc8bf1d8731e2fbee5f88da56bfa6
-
SHA512
5c0df3e960dc75d204aef02ea006c4135d50fe9654a0d55c3c66c19047e89856323f109df9749a5b7b56ef78b7200c0882a85561513c1526322edad7436a5d3b
-
SSDEEP
98304:IzCs6IZ2k7AMUrtN3zFayq2VO6DbfK1okdAdrnypNpC:IWcYcpEtN3pa32VBDm1oLc
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
02fbc16f240023c0ad872ec1c28ca213d5fdc8bf1d8731e2fbee5f88da56bfa6.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE