Behavioral task
behavioral1
Sample
edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723.exe
Resource
win7-20220812-en
General
-
Target
edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723
-
Size
5.1MB
-
MD5
f83e21f51ee83b616b053ca7e19695a5
-
SHA1
62af9e5657773b77401bc002b38b11fbb1f52e1e
-
SHA256
edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723
-
SHA512
3af1b0e1bd3e3614eee8c3b3332a409b6fa2f200c67999cc4749b8932ead9cc5e2dcf90ea683208566dc949939d1b3985cb5359e82fefe0617584751ff58737b
-
SSDEEP
98304:0UwOhsGK16l/Xg7dIVcBrn305ia9WnUXSCkp77rN0lcI:0whsgaBIKn3m92Fr6W
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 13.6MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE