Behavioral task
behavioral1
Sample
c2001eecdea2cd280ceef06df6ecef0d43c1a47aaa68f6207656d2f9e7f45651.exe
Resource
win7-20230220-en
General
-
Target
c2001eecdea2cd280ceef06df6ecef0d43c1a47aaa68f6207656d2f9e7f45651
-
Size
4.3MB
-
MD5
2e1b5fbcf6d80825abf79e449d4f7d45
-
SHA1
a58fd883e837d3ed65a8ba1a6b764a203cbe0923
-
SHA256
c2001eecdea2cd280ceef06df6ecef0d43c1a47aaa68f6207656d2f9e7f45651
-
SHA512
01ff29b3ed0cd6616e5bd26f922c87f56171e154756c537dd235a1268f758dd6a0c15b5e4422746feeb3097cc88798bf988c9a21879a47b303625e93ee1821d7
-
SSDEEP
98304:lf+5o/KQDE223URXfD/BHUCxdkJl0V/kyaYXlG3lo2vz2+:Bgo/HJ23mfDiaile/kyHYTvS+
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c2001eecdea2cd280ceef06df6ecef0d43c1a47aaa68f6207656d2f9e7f45651.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 10.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE