Behavioral task
behavioral1
Sample
5f195ca22e44063b490ecfc8043ff3fa6166748787c8891b351f071882e45b12.exe
Resource
win7-20220812-en
General
-
Target
5f195ca22e44063b490ecfc8043ff3fa6166748787c8891b351f071882e45b12
-
Size
4.0MB
-
MD5
14dfd246576f67ae18b8623b30470cda
-
SHA1
0b3e8114eca796e3f583fec3adc230f69e67aedc
-
SHA256
5f195ca22e44063b490ecfc8043ff3fa6166748787c8891b351f071882e45b12
-
SHA512
44d1277354de71d7841172d8858176a4650cd16ccd32eb5cf733742a3676f478d46b9ee8681d3d26a5123f7d5cf663613b7813b5c3b7bd9d2733880ace70aa89
-
SSDEEP
98304:/HryMOwf/GGQmJhRTGI0msbfvIFS/Pg+8M6HpucD4oX:/Hryjwf/GvmJHTGIBssMPBCAboX
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
5f195ca22e44063b490ecfc8043ff3fa6166748787c8891b351f071882e45b12.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE