Static task
static1
Behavioral task
behavioral1
Sample
bypass-clm-nosima.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bypass-clm-nosima.exe
Resource
win10v2004-20230915-en
General
-
Target
bypass-clm-nosima.exe
-
Size
6KB
-
MD5
8d0341f8064ddc9eb5049dea94c33ac0
-
SHA1
2a147a622b372ca9b9dc591328ac457339b3e04a
-
SHA256
280e7679164432d2e07bc57f9bbe58129c8338ccbc90bc950657c275fef13539
-
SHA512
777ec31457c0633f219cf6fda9cc18a3e4d5147184292f38170ed2690ec9acf193aca9ae61a8aecf85760bcf9a4d01c22cece42a2cb7a32e60250ada2c8ee3e6
-
SSDEEP
96:m/j90G/MzVEsxBgnlT3+eYflrkKIMbX+l9rzNt:mr9g2DnV+npjbXI9t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bypass-clm-nosima.exe
Files
-
bypass-clm-nosima.exe.exe windows:4 windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ