Behavioral task
behavioral1
Sample
6135358083176540d873c743ff2e07d548c50607d0505d43acdd862259543eca.exe
Resource
win7-20221111-en
General
-
Target
6135358083176540d873c743ff2e07d548c50607d0505d43acdd862259543eca
-
Size
2.4MB
-
MD5
4a6b849ab81f41a63f35c6cbcfcdfc80
-
SHA1
e96139702c07b6cc7c26bba434f9986863b47660
-
SHA256
6135358083176540d873c743ff2e07d548c50607d0505d43acdd862259543eca
-
SHA512
d2e59454302103ba66169a6ee16cf0e65cbc8df5cc5558c60177a5751a857e07df8c5c079341327b5255466e55037acad16bcea73fa49296626aa87eedaf2c81
-
SSDEEP
49152:XkdPPFBrHcyhshP+3Wvw49g6+sflDok0czMeXrr0sAUndhU8prtu:XcPPrDxsc3uw4IUlcUJ/HwYtu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6135358083176540d873c743ff2e07d548c50607d0505d43acdd862259543eca.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 5.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE