Static task
static1
Behavioral task
behavioral1
Sample
686467f75a5c0a056aba4614aa42e404fe9535d3de98806ad8c059c582f55716.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
686467f75a5c0a056aba4614aa42e404fe9535d3de98806ad8c059c582f55716.exe
Resource
win10v2004-20230915-en
General
-
Target
686467f75a5c0a056aba4614aa42e404fe9535d3de98806ad8c059c582f55716.exe.zip
-
Size
357KB
-
MD5
83b12cf72b031d04d7cd1d88bf785165
-
SHA1
f33cfecda85d20b0eb058c9849b084fe48c4d658
-
SHA256
9f843b203128a247294eb23e36b5b1a21443d2a0366ab9166ab2795c3164183c
-
SHA512
dd990de429d4d8eb45a0307bccf0aac2e17b09351697221ca1fe24b06c3784ee6d720a6200bd8326dde4a4eafa75349bfde500d36b39469cd8f2030e1f9918e4
-
SSDEEP
6144:qgO2YUHWRoS05p3Wwsg+KDMZIvPF3yuCSvddM7rO2chmkgips4oZt7:qgOBKWqtT3fEKIZI34Sv2i2fkgV42t7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/686467f75a5c0a056aba4614aa42e404fe9535d3de98806ad8c059c582f55716.exe
Files
-
686467f75a5c0a056aba4614aa42e404fe9535d3de98806ad8c059c582f55716.exe.zip.zip
Password: infected
-
686467f75a5c0a056aba4614aa42e404fe9535d3de98806ad8c059c582f55716.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
@O:\I* Size: 326KB - Virtual size: 326KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ