Static task
static1
Behavioral task
behavioral1
Sample
5fcf26a6cafc3a3c6713b5f8461a24041de6006bc170723585fede5288c4a73f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5fcf26a6cafc3a3c6713b5f8461a24041de6006bc170723585fede5288c4a73f.exe
Resource
win10v2004-20230220-en
General
-
Target
5fcf26a6cafc3a3c6713b5f8461a24041de6006bc170723585fede5288c4a73f
-
Size
17.7MB
-
MD5
6626f2392431ac3f1f9f47bac95248ce
-
SHA1
0ceba4760018bb6c2417b67209e99f229f75b574
-
SHA256
5fcf26a6cafc3a3c6713b5f8461a24041de6006bc170723585fede5288c4a73f
-
SHA512
f620503d63ab14ebf8a9e303132e9c4382e89e29dacedbe4179c04bbb7e87a95bef75aab3c93d7533a7c0c89bcae71e7a7f5b2caa2d2042f411f60540cd8268a
-
SSDEEP
393216:0sqmChr6Fdf4mk3hWrNLy3G6DXBMI7fKw3nLX/JNZ3BjXOM1RWmBPJCf3cI/0Jzv:jWdiF4DINLyW6DXBMgfKw37Br3dm4h2w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5fcf26a6cafc3a3c6713b5f8461a24041de6006bc170723585fede5288c4a73f
Files
-
5fcf26a6cafc3a3c6713b5f8461a24041de6006bc170723585fede5288c4a73f.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ