Static task
static1
Behavioral task
behavioral1
Sample
d81624b2c2357576007f216879464f8cf4a012c9e9dda5f2dfe246b651be3307.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d81624b2c2357576007f216879464f8cf4a012c9e9dda5f2dfe246b651be3307.exe
Resource
win10v2004-20230703-en
General
-
Target
d81624b2c2357576007f216879464f8cf4a012c9e9dda5f2dfe246b651be3307
-
Size
6.1MB
-
MD5
f85d6f25aaae4330ea390f73a3916645
-
SHA1
cd80772a5307ea0d8b7d402d762faf2356341dc4
-
SHA256
d81624b2c2357576007f216879464f8cf4a012c9e9dda5f2dfe246b651be3307
-
SHA512
83d8b25be34229c94894a9a97918ed8faf1e70d6b81acd25559a0101a91a6869b059539f7797c7c9be6fe99b89bd5e1f010a50030110546724e3dd53eab8bd83
-
SSDEEP
98304:1DmOO1+dJZmCWmf4wTWNxovbkhQh+IQ48cK9iYhiZN2DOBHlXYZBQOnWTXwDmVX4:rO1AZfQuwhQEIQfcK9iYhiZQk0BQOIR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d81624b2c2357576007f216879464f8cf4a012c9e9dda5f2dfe246b651be3307
Files
-
d81624b2c2357576007f216879464f8cf4a012c9e9dda5f2dfe246b651be3307.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 432KB - Virtual size: 782KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 32KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 32KB - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.winlice Size: - Virtual size: 8.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 5.6MB - Virtual size: 5.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ