Static task
static1
Behavioral task
behavioral1
Sample
faa8331275670b09a25805351309d6c6369d06660c3849f8a64448b805673ee5.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
faa8331275670b09a25805351309d6c6369d06660c3849f8a64448b805673ee5.exe
Resource
win10v2004-20230703-en
General
-
Target
faa8331275670b09a25805351309d6c6369d06660c3849f8a64448b805673ee5
-
Size
438KB
-
MD5
a9e56b0cf5d7f1e375790765bca49f24
-
SHA1
ba03b04022b19667a598807dcb685d70d18a4afc
-
SHA256
faa8331275670b09a25805351309d6c6369d06660c3849f8a64448b805673ee5
-
SHA512
e66b346a68a265573ff6f36d6ea59e4178ed6bcd7e4af60230675f4ba77af1c4013e4920d2f4602f61ae4dfca6c6c0b982de3cab402dccc8b4f3383b044bb8c1
-
SSDEEP
6144:OOL3z88f9ZIWmmcVm2MyU66xsnYNsyD0VRw+PBjb1AGA1hShluGEG:jj88f9ZPm9VIn6VQb0Vl9ZA9nSvD1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource faa8331275670b09a25805351309d6c6369d06660c3849f8a64448b805673ee5
Files
-
faa8331275670b09a25805351309d6c6369d06660c3849f8a64448b805673ee5.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 325KB - Virtual size: 325KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 70KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
xjwjrlk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE