Static task
static1
Behavioral task
behavioral1
Sample
2d82981fae43dc801e460bcf1aad04957a373f39d6ea8f23696e36707b1febac_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2d82981fae43dc801e460bcf1aad04957a373f39d6ea8f23696e36707b1febac_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2d82981fae43dc801e460bcf1aad04957a373f39d6ea8f23696e36707b1febac_JC.exe
-
Size
4.5MB
-
MD5
95a548d18cd7e7794152b3e1623adf98
-
SHA1
6b480c504e57ef1b7ad2ab6fccb0374584c479a6
-
SHA256
2d82981fae43dc801e460bcf1aad04957a373f39d6ea8f23696e36707b1febac
-
SHA512
6cd6d3a2f1888feb8c28f5803ef0e5ce7a2bcfd0330246e8114de3dd7263d96688d46b2a1b55caf1253fc18f9027229763017465a332e2197a10950f2a2d8a9a
-
SSDEEP
49152:6p+LoXU1ThfwM9rb/TZvO90d7HjmAFd4A64nsfJMy+lJrrq0Lu6TnWMdiSmIC/xW:3dhoPCrdnW86vteEUp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d82981fae43dc801e460bcf1aad04957a373f39d6ea8f23696e36707b1febac_JC.exe
Files
-
2d82981fae43dc801e460bcf1aad04957a373f39d6ea8f23696e36707b1febac_JC.exe.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 9.4MB - Virtual size: 9.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10.2MB - Virtual size: 10.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 579KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.symtab Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ