General
-
Target
e1919f8b00e3d5be295fa1564fd8084f310d5edc1c0ec82a8d738c12eb3e1a3b
-
Size
2.4MB
-
MD5
4b149386c2fe020964b23da6948cabd1
-
SHA1
2d6a01f7aa3f7a3a1e290baa28a0ca41e84ecb0f
-
SHA256
e1919f8b00e3d5be295fa1564fd8084f310d5edc1c0ec82a8d738c12eb3e1a3b
-
SHA512
fde371216df9fe41153ffe6235397a7e469ccaba1d84106066eaafc7730d5d878020779e9832a6a541fac5a863202ab92da2ddf21905b0905a3992874f021d48
-
SSDEEP
49152:8KGZy65j97HsZLbPKfBFgIIlXZzEFanwB2zF3pxq3oHWX7vgiMh:8KGZfMJPiBSNz4awB2lq3oHwM
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e1919f8b00e3d5be295fa1564fd8084f310d5edc1c0ec82a8d738c12eb3e1a3b.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 5.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE