Behavioral task
behavioral1
Sample
c01b27b632ab168db0a459cdb92c8d8a73d008df83556b360840a3ef747cf8ef.exe
Resource
win7-20230220-en
General
-
Target
c01b27b632ab168db0a459cdb92c8d8a73d008df83556b360840a3ef747cf8ef
-
Size
4.3MB
-
MD5
029b9b11f7a4bcd31674d6c4d4902ecc
-
SHA1
1546fa28900e15955ca97569a003305e00ccfa8a
-
SHA256
c01b27b632ab168db0a459cdb92c8d8a73d008df83556b360840a3ef747cf8ef
-
SHA512
d0e7c0d336e1f7a2a6695084cdd5395eb76c1c82105b79fc2b75236c548cb1b5a2c69244248a8aa576bcc308b53c90966dbc26e876dba675554638180860495e
-
SSDEEP
98304:11WFgU58vFbHz+HfZuKeNE7UxrVzEIDlh4qMCKjL0ld9O:1rYulNEidEXDCKcl
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c01b27b632ab168db0a459cdb92c8d8a73d008df83556b360840a3ef747cf8ef.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 10.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE