Static task
static1
Behavioral task
behavioral1
Sample
3bc5a07a35fe8008569558ea91036b296b953de52540e3921a941e5aa6e4cf4f.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
3bc5a07a35fe8008569558ea91036b296b953de52540e3921a941e5aa6e4cf4f.exe
Resource
win10v2004-20230621-en
General
-
Target
3bc5a07a35fe8008569558ea91036b296b953de52540e3921a941e5aa6e4cf4f
-
Size
2.0MB
-
MD5
a74c5c53ac96cb3bc12c84a0ab0985a8
-
SHA1
98f10499ffedad5f1f5caad8013b04cf1ac58058
-
SHA256
3bc5a07a35fe8008569558ea91036b296b953de52540e3921a941e5aa6e4cf4f
-
SHA512
4b1ca5bb2273d6288fb3326983c8d3bac670b47abed163c7c16cbd840d9e38eac4fcda2bb64f4312fda8bdf7d9c036c7e12568f6de530a3665325c18d1a5340e
-
SSDEEP
24576:TGyfwan7BVKPlJKMbtMT0DYxt7rFpdLSGEJrbClX/4f3uDHROgCHH:Jfw8VQ868wDH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bc5a07a35fe8008569558ea91036b296b953de52540e3921a941e5aa6e4cf4f
Files
-
3bc5a07a35fe8008569558ea91036b296b953de52540e3921a941e5aa6e4cf4f.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yP Size: 588KB - Virtual size: 588KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata2 Size: 9KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE