Static task
static1
Behavioral task
behavioral1
Sample
PanelModByPaloxizz.exe
Resource
win10v2004-20230915-en
General
-
Target
PanelModByPaloxizz.exe
-
Size
72KB
-
MD5
26c2be5fe46147528ef2b93f3ae762bf
-
SHA1
f8d2b16d73c522d4e22c4a45a3eed2a01789a453
-
SHA256
b3ef3e359797f37d1569954d7e71983fedda49d8e21d3709856f276ef14f7c7c
-
SHA512
cfba55263caa84b642b91f5582a3d36c6341f4b9d93c087fdb174fc8116843f6943341af9428a15c8792ed57167e17a8f2928324b999aaea4f17eb026568bba2
-
SSDEEP
192:/OxNFxQMDSxyKJQ5NPy/2/LrzsZA+Wj5nH3SfABQ/kyl+MuGpIknGcD:WNvQbc7MuHzwAB5nifKwkyl+8SkDD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource PanelModByPaloxizz.exe
Files
-
PanelModByPaloxizz.exe.exe windows:4 windows x86
f9bfccc82b6cfe6f82f41a3e115e0db2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord556
ord666
ord592
ord595
ord598
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord608
ord716
ord717
ProcCallEngine
ord535
ord685
ord100
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ