Static task
static1
Behavioral task
behavioral1
Sample
f25656b2ab5def8ed977484f9a9ab2917fde6c55bc641ad451bb208ab74fa6a0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f25656b2ab5def8ed977484f9a9ab2917fde6c55bc641ad451bb208ab74fa6a0.exe
Resource
win10v2004-20230220-en
General
-
Target
f25656b2ab5def8ed977484f9a9ab2917fde6c55bc641ad451bb208ab74fa6a0
-
Size
1.6MB
-
MD5
f63e78a73d02839135816779fa8890e5
-
SHA1
613c612a3ca43f9a88e50dc651fe9499ebacbaae
-
SHA256
f25656b2ab5def8ed977484f9a9ab2917fde6c55bc641ad451bb208ab74fa6a0
-
SHA512
c74d2473e4c0b5af560f216af49f1c4c91bbe5e10b08a4f54cec42ca404aa8b6edbe4f3c75f974330b99bdf6c49b3908bbc8b1e6a917580ff161ec55654d26d7
-
SSDEEP
24576:9eZMU13L6E3TmfTGWCfrxTnEViHDNwtJ2dEb+SwHaP6XSgXAEf/yljYRNF5XE+N+:xUt2Eo1C9hitgCbzwHayigQEnyt+Wh7T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f25656b2ab5def8ed977484f9a9ab2917fde6c55bc641ad451bb208ab74fa6a0
Files
-
f25656b2ab5def8ed977484f9a9ab2917fde6c55bc641ad451bb208ab74fa6a0.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ