Static task
static1
General
-
Target
Loader.exe
-
Size
43KB
-
MD5
a64fe8d79afd191eb9a80063be317f44
-
SHA1
861739861f5146f5d3fa70e91abd8046baee40ad
-
SHA256
d4681e73e4e4707720797b7cfe27ff937155be1e5a7e4d98b13b878581a1974c
-
SHA512
4707a7436c0acc4e2e58d03f5915bc9b4cd1853811e63740c51493177f365c7d3109f7d286903d3c3b30a249cb4b3d2f23c1942cee8fa21a4768deaadfbdd6c9
-
SSDEEP
384:trU5+Geq3ei3S/freWUQ9OrLnLrWY55KUjx4GVHD99LeQm/in3avU8o3SF38C:trsr3eiWfyWUQ9OrzLgQrDXiT38C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Loader.exe
Files
-
Loader.exe.exe windows x86
bff983b5fa21bb8c13bf11543e08f6bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
kernel32
ExitProcess
ExpandEnvironmentStringsA
FindResourceA
GetCommandLineA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetTempPathA
LoadResource
MapViewOfFile
ReadFile
ReadProcessMemory
ResumeThread
RtlMoveMemory
SetEnvironmentVariableA
SizeofResource
DeleteFileA
TerminateProcess
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtectEx
WritePrivateProfileStringA
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
CreateProcessA
CreateFileMappingA
FindClose
FindFirstFileA
FlushFileBuffers
WriteFile
SetCurrentDirectoryA
CreateFileA
CloseHandle
Sleep
shell32
ShellExecuteA
advapi32
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
comdlg32
GetOpenFileNameA
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ