Static task
static1
Behavioral task
behavioral1
Sample
f60423d0190c198de9fd12feddaa333ebf382e5ed878247fa839fafc0dc3c32e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f60423d0190c198de9fd12feddaa333ebf382e5ed878247fa839fafc0dc3c32e.exe
Resource
win10v2004-20230703-en
General
-
Target
f60423d0190c198de9fd12feddaa333ebf382e5ed878247fa839fafc0dc3c32e
-
Size
2.0MB
-
MD5
6988011f647f8b3f0c4c464e276f85ac
-
SHA1
66e959675c17a69bf3bec00b2bc2cc07fd5d8ee9
-
SHA256
f60423d0190c198de9fd12feddaa333ebf382e5ed878247fa839fafc0dc3c32e
-
SHA512
468b063b2d336bb016e034a63697e41985c65d608b43d6e67f87f931f204a100a594d4e72aa5d38d891f6abfb959c03de8969c28153d1463942685e9f895df7a
-
SSDEEP
24576:TxbavHw81APeZ8pxNvQ82nU9pDEYPLbGEJeOmfWY1+gnQME33kXuRL284dSO:ZavQ81ATNvQLn4j3SOCN1+6EGi5c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f60423d0190c198de9fd12feddaa333ebf382e5ed878247fa839fafc0dc3c32e
Files
-
f60423d0190c198de9fd12feddaa333ebf382e5ed878247fa839fafc0dc3c32e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 380KB - Virtual size: 932KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 108KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 32KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 841KB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 698KB - Virtual size: 700KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE