Behavioral task
behavioral1
Sample
DA13B2DEBF999F977C6E60FB8DBF5D59268DDCF11601BC2C58EB2D9533EA5176.exe
Resource
win7-20220812-en
General
-
Target
DA13B2DEBF999F977C6E60FB8DBF5D59268DDCF11601BC2C58EB2D9533EA5176
-
Size
5.1MB
-
MD5
ed8528ba4380ce7ba2e7fd5c1cd6e36b
-
SHA1
adabaad282b5bbfaaf55104c3c820740f33400dc
-
SHA256
da13b2debf999f977c6e60fb8dbf5d59268ddcf11601bc2c58eb2d9533ea5176
-
SHA512
8d6253d447a5b56b1836776deec45c375ab305cdff73036238225143cc0d733bb9a0f14d817f1b854e6f261e14be77905c5968a5e82b1d451f79cc6bd6f98bac
-
SSDEEP
98304:bd+fYH0n0Q/ZP4VfB2eceCXlu1lKagkCls4WOHc5NDoD+IrsZ:qYql/ZP4tB2enCXlOlQlHHrzs
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
DA13B2DEBF999F977C6E60FB8DBF5D59268DDCF11601BC2C58EB2D9533EA5176.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 13.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE