Static task
static1
Behavioral task
behavioral1
Sample
af2a5455f4de7136e90e94e7bee5ba398d01f09ab9d01ef32bb70e560030b650.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
af2a5455f4de7136e90e94e7bee5ba398d01f09ab9d01ef32bb70e560030b650.exe
Resource
win10v2004-20231023-en
General
-
Target
ee67f8e5c473d7b541be90a0ee046f8d.bin
-
Size
656KB
-
MD5
6758e6bd6b564bce32917a2ca65a57d5
-
SHA1
6d49471e32a1ae190fe07952f00a4d29a37fbbaa
-
SHA256
3143e385924baea186dc681f74b7ce82f72def17b2b3c69a23c9b9eee423b210
-
SHA512
1f1365fa5085ac3c36f1c903b710915b80bb392e47cdf7dd8e0e6c77019518ac09895bdcc80889f34f8f7efcf2672f2483e763071703e2bd86269dd8bb6a3b94
-
SSDEEP
12288:DQHHhCSsE2iPvSGM9fDdwN9NYhUGn+EjM/M8DtXs+z3JaPfLb+agJL17Fu4do:DSDs9iPKGM9Dk9NE+EgM8DtXRzeb+zLo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/af2a5455f4de7136e90e94e7bee5ba398d01f09ab9d01ef32bb70e560030b650.exe
Files
-
ee67f8e5c473d7b541be90a0ee046f8d.bin.zip
Password: infected
-
af2a5455f4de7136e90e94e7bee5ba398d01f09ab9d01ef32bb70e560030b650.exe.exe windows:4 windows x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 540KB - Virtual size: 539KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 496KB - Virtual size: 495KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 64B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ