Static task
static1
Behavioral task
behavioral1
Sample
bypass_ps1_extracted_pe_file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bypass_ps1_extracted_pe_file.exe
Resource
win10v2004-20230220-en
General
-
Target
bypass_ps1_extracted_pe_file
-
Size
171KB
-
MD5
b24e714962c627bc153be748efe9d288
-
SHA1
68d9fe8a592534e180db5ec89afe999221e43fec
-
SHA256
8bbf3420ad5b1e7283ecc131dd720728a0ebaba799d9084509c8a47b8efe1cb0
-
SHA512
a4cbf257a3196aac284df85285d224f626689257b525db3fe73b3ff213b4b70a171e40e836760d93dd70dd78e142ff564f9bf678bb4010452bfcd3853bac340b
-
SSDEEP
1536:g1c9URWzKr7PhuuUpV7+5JTiy95BuUCQahsf5mZIWiwwr7QXsouW2ASDDA6rRSCM:g1pWaxa7Dy95pS2lzxnIvXtZzSaPnp
Malware Config
Signatures
Files
-
bypass_ps1_extracted_pe_file.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ