Static task
static1
Behavioral task
behavioral1
Sample
Webhook.Spammer.exe
Resource
win10v2004-20230703-en
General
-
Target
Webhook.Spammer.exe
-
Size
14KB
-
MD5
c558d56214bd2be20f43b4e6f6020609
-
SHA1
2e7e9747ed9f512acd9d432f185b315b12199aee
-
SHA256
4da11d3158a8529ed18673ff27cbf973ed92f5aaf76fd5df29e596376b5d74de
-
SHA512
cfc3c2a5d833626ae4997e7abc7d091b190f85df9f01b555614d112399fac9517212c5f0fc391d5d616b5781d8d8a28cf4825c279a74f6cbf4b36edfde5817a6
-
SSDEEP
192:3r0d0VEkREQaUqsucdywi+EirtkZcDiJAq2WxgzKCdUYOIHC5:70qNaIFdyN+EihkZCQomgGMUYOIH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Webhook.Spammer.exe
Files
-
Webhook.Spammer.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ