Behavioral task
behavioral1
Sample
a9b558e1658ccc50bd076c98f0cb14ff4e5702982cc14f918b4bcee8e96c0540.exe
Resource
win7-20220812-en
General
-
Target
a9b558e1658ccc50bd076c98f0cb14ff4e5702982cc14f918b4bcee8e96c0540
-
Size
4.0MB
-
MD5
ebb3266a17a113966611ffa1dbc9e9e5
-
SHA1
39f8c4469b92cea5532cab0e2e1b1893f0b6a6cf
-
SHA256
a9b558e1658ccc50bd076c98f0cb14ff4e5702982cc14f918b4bcee8e96c0540
-
SHA512
1cf6f32463bb9e8c5827e159364519de33f55a9af365b574f0d28174036e64e8eba8646993439b76442fbcf02c1e267b93e08567edc2db81de854a5f79f2dc3e
-
SSDEEP
98304:Lw9z502/GG+Lf0wDeRhB/szdUvTKJqZIFRSYtp2oAN:89z50mt+Lf0EeRhx2dKmAIkN
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a9b558e1658ccc50bd076c98f0cb14ff4e5702982cc14f918b4bcee8e96c0540.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 10.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE