Static task
static1
Behavioral task
behavioral1
Sample
Fact_30731117669738501624265585139698360530094594442803770872377020241339017462853222.rar
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
Fact_30731117669738501624265585139698360530094594442803770872377020241339017462853222.rar
Resource
win10v2004-20230824-en
Behavioral task
behavioral3
Sample
30731117669738501624265585139698360530094594442803770872377020241339017462853222.exe
Resource
win10-20230703-en
General
-
Target
Fact_30731117669738501624265585139698360530094594442803770872377020241339017462853222.tgz
-
Size
174KB
-
MD5
52abe0179f31030c67c04c130bcb2f1b
-
SHA1
426492d7814f790abcf9a9d5e1573917824fe3c6
-
SHA256
fae3d6c4ed79d66c39f2291e3a7cbf8a094c5317068ce31ba9ea7ed678b643b1
-
SHA512
15a838b04af45e911900cac91afca90dc91211ee15aa89bf3d892cecca0b488e20106f8770ec6c5bf703dcd63f61d1284e0f4ceeee3fceedac22ec69dd6a9750
-
SSDEEP
3072:86Y/oLMDaMCuZuEnnj2+Fbf3b4QRgBJdwR/EKiVwFpPmBUns34KouFwIbtV:86eoLOZuwl5EQRAc5EFVwpPmJoKouCIb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/30731117669738501624265585139698360530094594442803770872377020241339017462853222.exe
Files
-
Fact_30731117669738501624265585139698360530094594442803770872377020241339017462853222.tgz.rar
Password: 1723
-
30731117669738501624265585139698360530094594442803770872377020241339017462853222.exe.exe windows x86
Password: 1723
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ