Static task
static1
Behavioral task
behavioral1
Sample
fea7e3a93c8965a03d7e805d661e3d1b5c6c356387b73e649492941f3a6e50ed.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fea7e3a93c8965a03d7e805d661e3d1b5c6c356387b73e649492941f3a6e50ed.exe
Resource
win10v2004-20220812-en
General
-
Target
fea7e3a93c8965a03d7e805d661e3d1b5c6c356387b73e649492941f3a6e50ed
-
Size
60KB
-
MD5
8008b40c7fb7c3e17290f82a909b4430
-
SHA1
81258599a5418db7e0f6aac247a0650d94922289
-
SHA256
fea7e3a93c8965a03d7e805d661e3d1b5c6c356387b73e649492941f3a6e50ed
-
SHA512
b2575a9c7552e6ee10c1f6d60d2a878900f08d2781da563bfe99667d0a25a4535ff2a656ed9cd8bbd00d2d4307697d93de468d4e0542622cccb263e43b74b6f0
-
SSDEEP
768:0yki1Fqich9IrQFmUuTK1n39AQdoxZ8O3G89hzEzMG27B79N4XnppcvQOB3QbxyC:9kSncSU/1KqokGn5bqpAB3OxyG
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
fea7e3a93c8965a03d7e805d661e3d1b5c6c356387b73e649492941f3a6e50ed.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 516B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE