Behavioral task
behavioral1
Sample
e7aed2cd122763b97c297cb7750547438eca440d1cd459a084eb698c9a4007c5.exe
Resource
win7-20220901-en
General
-
Target
e7aed2cd122763b97c297cb7750547438eca440d1cd459a084eb698c9a4007c5
-
Size
2.4MB
-
MD5
62ea939190e478cb350c44efcd7b3c54
-
SHA1
55c718e59d97b12e1ed746e15be8365e7dee3283
-
SHA256
e7aed2cd122763b97c297cb7750547438eca440d1cd459a084eb698c9a4007c5
-
SHA512
c1a66cecd3be37d233df13189564d258c34fd9dea8553eb9143ed8aaee46d8715677cfd1884ce627333bb03eb152540e66766284e1542fb2be0496af523d5ce5
-
SSDEEP
49152:DaD7M/XJTz9pgYA3trYRQyVs749wTtLd/JyvKSSGHIycqvzKv:s8Tz9eFtrY6UX9wTtaYGoycKm
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e7aed2cd122763b97c297cb7750547438eca440d1cd459a084eb698c9a4007c5.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 5.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE