Behavioral task
behavioral1
Sample
bb57c20116377a50473e83604488f1935311dbf93a419cdeb41cf051ffd22b31.exe
Resource
win10v2004-20220812-en
General
-
Target
bb57c20116377a50473e83604488f1935311dbf93a419cdeb41cf051ffd22b31
-
Size
537KB
-
MD5
2ce459cbd15f96b92c6b411b9eaeb24c
-
SHA1
d4ef5e179d1e4510141537bd59dca1d6fdb83a6a
-
SHA256
bb57c20116377a50473e83604488f1935311dbf93a419cdeb41cf051ffd22b31
-
SHA512
f5385c52c7945cfb2196edbda6aebd7007d383fc837712585c501387704709f9882f36559736b0804455a5c9eb09015d4f6e88135339c340c643554b0d4cb53c
-
SSDEEP
12288:z4lThwQGIQilGzWTifG1g6eUt5uPPRg7zhTnn6wi8TQBVW6:slTOFq7TifGG6wR6TnRi8To
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
bb57c20116377a50473e83604488f1935311dbf93a419cdeb41cf051ffd22b31.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 876KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 535KB - Virtual size: 536KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE