Behavioral task
behavioral1
Sample
9001e61f10ffe0b7f54e21d8258f3b8276f42116b65803c320d3b9709c00ff84.exe
Resource
win7-20220812-en
General
-
Target
9001e61f10ffe0b7f54e21d8258f3b8276f42116b65803c320d3b9709c00ff84
-
Size
2.4MB
-
MD5
113fde86de7c39631cc1df277296e7b2
-
SHA1
78d362cdf03b09ef983c2115adb593d1e417531a
-
SHA256
9001e61f10ffe0b7f54e21d8258f3b8276f42116b65803c320d3b9709c00ff84
-
SHA512
3594866a359c8050001540c30e9335cc8c5dcb2f5520b80db2f2d861cb410e7d28e17146988737f4e4b573010fe070a5a8e10599fffc5a52f21540079cf69c30
-
SSDEEP
49152:SffhL+2bREgtodJwJgpLhdBbS/21s/bpd+qoI:SffU2lEwodJjpLfBibpd+qD
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
9001e61f10ffe0b7f54e21d8258f3b8276f42116b65803c320d3b9709c00ff84.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 5.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE