Static task
static1
Behavioral task
behavioral1
Sample
39d823a6fc2950c7d1c3f9ffc01dfc696ada0a96f86e2b99cee046970560080b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
39d823a6fc2950c7d1c3f9ffc01dfc696ada0a96f86e2b99cee046970560080b.exe
Resource
win10v2004-20230703-en
General
-
Target
39d823a6fc2950c7d1c3f9ffc01dfc696ada0a96f86e2b99cee046970560080b
-
Size
4.2MB
-
MD5
44dc518cc90d5b5134c04d1e6bd7b170
-
SHA1
35dccc89f0b869eb947c59878e4e2687e7e147b5
-
SHA256
39d823a6fc2950c7d1c3f9ffc01dfc696ada0a96f86e2b99cee046970560080b
-
SHA512
457b0c7211053202f4e1ea41efa3048a95315e99f42f8aacdabf21465b1f5a48e5320c13377a16d4f291d29d0fca6ad4f44c4a9f253779767cd7a8871a13015c
-
SSDEEP
98304:d/FoG/madFvVviBpj1IpegiqG347SylA9YZGUgz83UGCHK:pFoGbvVviBpHgi/347/gYZ3kxq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39d823a6fc2950c7d1c3f9ffc01dfc696ada0a96f86e2b99cee046970560080b
Files
-
39d823a6fc2950c7d1c3f9ffc01dfc696ada0a96f86e2b99cee046970560080b.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 291KB - Virtual size: 664KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 561KB - Virtual size: 912KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 94KB - Virtual size: 532KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 409KB - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE