Static task
static1
Behavioral task
behavioral1
Sample
ea1b4810721b21c33205ab971c34c88bbf117114f99c366a2ea68832b80dce09.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea1b4810721b21c33205ab971c34c88bbf117114f99c366a2ea68832b80dce09.exe
Resource
win10v2004-20220901-en
General
-
Target
ea1b4810721b21c33205ab971c34c88bbf117114f99c366a2ea68832b80dce09
-
Size
49KB
-
MD5
44ec07b7c2c02da1d16e0a3f670778a0
-
SHA1
a53c2dc937d9d55f6295205c0eec0a1bef28f385
-
SHA256
ea1b4810721b21c33205ab971c34c88bbf117114f99c366a2ea68832b80dce09
-
SHA512
7ac366c0789d3a2b7be165cbdff00b00fc3dbe610bb8ee4fa046198f94f0270463e9d98197b41d2210842876485b6ae5282354b901a1d019e1d65c7f006f4f36
-
SSDEEP
768:2Z90/gv/whsTBrQu2BhMWfVPRd08coz0TnNxDcR7:WQ4/RrQhH5PRd08coaV
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
ea1b4810721b21c33205ab971c34c88bbf117114f99c366a2ea68832b80dce09.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 436B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE