Static task
static1
Behavioral task
behavioral1
Sample
b395a8d12bdc73d6738ef2950157435710015defed72647b54485e8d3adc20fa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b395a8d12bdc73d6738ef2950157435710015defed72647b54485e8d3adc20fa.exe
Resource
win10v2004-20230915-en
General
-
Target
b395a8d12bdc73d6738ef2950157435710015defed72647b54485e8d3adc20fa
-
Size
3.9MB
-
MD5
59949774b4d8e4738a5b17405bbcd5c4
-
SHA1
04dde579f21b114925981c795fd5036ae47841a2
-
SHA256
b395a8d12bdc73d6738ef2950157435710015defed72647b54485e8d3adc20fa
-
SHA512
c4dbd31820d2822d2fd10a0fde6c235eaf8a1f96f05d5a9ee9f60284445815f508f4d4d164188da73a47e518197226f2e05e7940b38822bd77af038a795e3e91
-
SSDEEP
98304:x/8pZyZOPSitwohlTMTzBQARCqbTWAXYe7oe4K:Cz6ZESTu+ke7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b395a8d12bdc73d6738ef2950157435710015defed72647b54485e8d3adc20fa
Files
-
b395a8d12bdc73d6738ef2950157435710015defed72647b54485e8d3adc20fa.exe windows:6 windows x64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text10 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text11 Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmpdmp Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ