Static task
static1
Behavioral task
behavioral1
Sample
4ffbfa01b4af8432675973d07b09d8a4a32ba6667cef09c770786cec0bb109fc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4ffbfa01b4af8432675973d07b09d8a4a32ba6667cef09c770786cec0bb109fc.exe
Resource
win10v2004-20220812-en
General
-
Target
4ffbfa01b4af8432675973d07b09d8a4a32ba6667cef09c770786cec0bb109fc
-
Size
60KB
-
MD5
057c1065500b939c7191cf31ff8301a6
-
SHA1
d4cbf4aa5ae7ad8681f079d6e95c1a2a72002056
-
SHA256
4ffbfa01b4af8432675973d07b09d8a4a32ba6667cef09c770786cec0bb109fc
-
SHA512
1ef3b3b9e4cc4d60458e6e917e140514130f15250d76bc4d2045db850f0e08d5f15d4a8024d00632eceb2465e2ac56c3777a7a70c2fbb5a08f111ea54d00ae7f
-
SSDEEP
768:0yki1Fqicl9IrQFmUuTK1n39AQdoxZ85UShfSYcy+5w6Loq3hdtTVj0XQQa1EpA7:9kSncGU/1Kqok5USh853Loq3tTmDa1G
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
4ffbfa01b4af8432675973d07b09d8a4a32ba6667cef09c770786cec0bb109fc.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 516B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE