s_665754_134235_3563345_1231245_910384_0193848_login
Static task
static1
Behavioral task
behavioral1
Sample
b7a552a122560ac5d61567e4313d8c2fd89793cb0af1ccbc49ebdbc0c0bda790.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b7a552a122560ac5d61567e4313d8c2fd89793cb0af1ccbc49ebdbc0c0bda790.exe
Resource
win10v2004-20230703-en
General
-
Target
b7a552a122560ac5d61567e4313d8c2fd89793cb0af1ccbc49ebdbc0c0bda790
-
Size
264KB
-
MD5
1efcec1c846f6f747eaee3943e0c147a
-
SHA1
2c9a34c0d58abba2c48c00c3b81043d87c2e6fee
-
SHA256
b7a552a122560ac5d61567e4313d8c2fd89793cb0af1ccbc49ebdbc0c0bda790
-
SHA512
17f319aef7733c8f0923be13b03c4e3f232ac6db2de227b22f2155654c4c5970f149b7d0ebe1ddbb3d1d130c712273173be71c04c17383a0f71da6ef21bc1543
-
SSDEEP
3072:u+ua/hQfg4S93sUu2LjOr13RA55sir4frupPd88WYt5ab3DmL3Wri6VhuXYBNwXH:u+l/6NgCPiVVB/t5ab3Dmi1buIXcIR/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7a552a122560ac5d61567e4313d8c2fd89793cb0af1ccbc49ebdbc0c0bda790
Files
-
b7a552a122560ac5d61567e4313d8c2fd89793cb0af1ccbc49ebdbc0c0bda790.exe windows x86
4528f77b19993b636676e403f4252110
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5194
ord6407
ord1997
ord798
ord533
ord825
msvcrt
_acmdln
__getmainargs
_initterm
exit
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_XcptFilter
_exit
__CxxFrameHandler
fopen
fclose
fscanf
remove
__setusermatherr
_itoa
kernel32
GetModuleHandleA
HeapFree
LoadLibraryA
FreeLibrary
GetCurrentThreadId
GetStartupInfoA
GetProcAddress
Exports
Exports
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 945B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 244KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ