Static task
static1
Behavioral task
behavioral1
Sample
ce3dab7e124372ea19e7e9e9b5c61a482951c72156d82196e9045cc2055d189c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ce3dab7e124372ea19e7e9e9b5c61a482951c72156d82196e9045cc2055d189c.exe
Resource
win10v2004-20230703-en
General
-
Target
2d49d0d6906103a3f6c171d354faa0af.bin
-
Size
2.3MB
-
MD5
8868cbc7fba10672a503c48a9f1a6550
-
SHA1
65d5f14bb821ae11a9710c2de0a2192afb48d8df
-
SHA256
72b3640abb897b8d94eebc052162679d2a356f7d017347d52adcbd2ba7603904
-
SHA512
c04f5d97833b4186565f070d9f9109e96ced880912d13cf02cb02af704503feb6a98b0c5d9c1b296136ab74d5f05762d5bf1315dd29b8b2f20fb64812c39ed99
-
SSDEEP
49152:HalzGNoudHLjmtezzxbQi2P9TbzAT8YlZHn4h8E9qjx2dwkrmRYZ:HalzmLeUzpQis9TbzLYlZYh8EHdw+mGZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ce3dab7e124372ea19e7e9e9b5c61a482951c72156d82196e9045cc2055d189c.exe
Files
-
2d49d0d6906103a3f6c171d354faa0af.bin.zip
Password: infected
-
ce3dab7e124372ea19e7e9e9b5c61a482951c72156d82196e9045cc2055d189c.exe.exe windows x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 792KB - Virtual size: 792KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ