Static task
static1
Behavioral task
behavioral1
Sample
71530342efddcfa17bd1cf2d2f3277399de24357a8ad8cc4600de93215d28329_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
71530342efddcfa17bd1cf2d2f3277399de24357a8ad8cc4600de93215d28329_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
71530342efddcfa17bd1cf2d2f3277399de24357a8ad8cc4600de93215d28329_JC.xz
-
Size
299KB
-
MD5
cb267cc8ee0f3feeb3478cfe0c3b8e77
-
SHA1
10a3726e5cbd87bebc37b8315098596922d592d6
-
SHA256
71530342efddcfa17bd1cf2d2f3277399de24357a8ad8cc4600de93215d28329
-
SHA512
3ef193ec74d1f461d9637aa108128b4b410f622be6bbdd0b4233dc0ba3d481cc2fbf42226d68a7c4604ab42041b47a24305a789056638d20bebcf61857ca0f2a
-
SSDEEP
6144:WdYX7soRqzfxNjpWKhxdih8G8mpInIIe4LrKnflIkaQiYrOSSm:WdmbRqzfvpnvR2pInIqKflHaLc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/71530342efddcfa17bd1cf2d2f3277399de24357a8ad8cc4600de93215d28329_JC
Files
-
71530342efddcfa17bd1cf2d2f3277399de24357a8ad8cc4600de93215d28329_JC.xz.xz
-
71530342efddcfa17bd1cf2d2f3277399de24357a8ad8cc4600de93215d28329_JC.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 379KB - Virtual size: 378KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 285KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ