Behavioral task
behavioral1
Sample
12d6e48b5774cf84b7aef916405078219b10924c0527692f4c235799c533d390.exe
Resource
win7-20230220-en
General
-
Target
12d6e48b5774cf84b7aef916405078219b10924c0527692f4c235799c533d390
-
Size
4.3MB
-
MD5
ba4be7f719bf64b702ecb4fb5b87e9fb
-
SHA1
263dd3f1390afcb9151383ecfd415eca3ff2d197
-
SHA256
12d6e48b5774cf84b7aef916405078219b10924c0527692f4c235799c533d390
-
SHA512
a2fa2d1c4685429f0bbf115ed973812bdc69e07fa3ccd64c7348c7310c0b2540c810868e7cd5a70005584baa308fa58de55e6a3718497e86beacd1e52952bdd2
-
SSDEEP
98304:ru7HMEGcgQWBmi0mcYv+yPcdsNibHARcU78gdXV/xzJ:NcgN0mHv+yESNiLPU788v
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
12d6e48b5774cf84b7aef916405078219b10924c0527692f4c235799c533d390.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 10.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE