Behavioral task
behavioral1
Sample
26fed2c1dd8f187471dc4566117565dd34451aa4401fc2b271aa9de60df3aecb.exe
Resource
win7-20220812-en
General
-
Target
26fed2c1dd8f187471dc4566117565dd34451aa4401fc2b271aa9de60df3aecb
-
Size
4.0MB
-
MD5
efb547309c1d3f1d88dbeaea67624002
-
SHA1
1ed73f37b906652a976c5d7c377685f7f0e8f1c9
-
SHA256
26fed2c1dd8f187471dc4566117565dd34451aa4401fc2b271aa9de60df3aecb
-
SHA512
4d38e8595e6bed32b99ffcdad16baa6983e3728a12dae3a918baf47e962c3b14dca2f2279b25fbbe3d805f90f99898bc458ae3347873945fbb30f974eeb347bd
-
SSDEEP
98304:7kS/7Kih5RIZdoDMowznI6hAK9stW/Jjo55CS5n8ZTuCt2a:7kSK85EdOV6nI6mfkJ+CqCTue
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
26fed2c1dd8f187471dc4566117565dd34451aa4401fc2b271aa9de60df3aecb.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE