Behavioral task
behavioral1
Sample
96af15568013f4fc68d3ad2f8984d60fd802212dde249c0c964a6201256d5f49.exe
General
-
Target
96af15568013f4fc68d3ad2f8984d60fd802212dde249c0c964a6201256d5f49
-
Size
5.1MB
-
MD5
44d24268d8683b2eed93462d12ac12fb
-
SHA1
93d2d0d9fc777ec60598c45f287f109335b8cf3a
-
SHA256
96af15568013f4fc68d3ad2f8984d60fd802212dde249c0c964a6201256d5f49
-
SHA512
4d5765ffbc29730870244771e05d99b134ccfb9317c9e1452262801272f91208769d409fea875405101fb4136ae9884ab444d519f5ed4dfeea647807accd182e
-
SSDEEP
98304:XSE88x+IANY22MD2oIqYHmlaPL9BOhnYW9sQgdITEUA/sDoUD9pGf0ENctPPrAEb:XPx6602oIqYHSIOhn79hgdITEj/sEUDs
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
96af15568013f4fc68d3ad2f8984d60fd802212dde249c0c964a6201256d5f49.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 13.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE