Static task
static1
Behavioral task
behavioral1
Sample
82e331c4b9b3e6c3846871badc5fbddba4a0245450f84730275311b80cbed84f.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
82e331c4b9b3e6c3846871badc5fbddba4a0245450f84730275311b80cbed84f.exe
Resource
win10v2004-20231023-en
General
-
Target
82e331c4b9b3e6c3846871badc5fbddba4a0245450f84730275311b80cbed84f
-
Size
11.0MB
-
MD5
5cdcc7e7455c6805f1d853f25855cf17
-
SHA1
c52ef5c51dc87805bf416cd61e0122bfa6e67460
-
SHA256
82e331c4b9b3e6c3846871badc5fbddba4a0245450f84730275311b80cbed84f
-
SHA512
b884799af30c49f9a24665ca16ba271059abbc7f8740ed01a969cad19c33536e704099a00ffbd7b9ae1c76bee98be64e3a5704155034ab2b3ec17f9a38ef9458
-
SSDEEP
196608:sCAC2FO+fSl4jYVoEWObIqYMvw9eC3ktbFi3ShCOSOvPolFev9qbxO/UZDcM8H:wzFJs4MhlbIqY7evQbNnxAz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82e331c4b9b3e6c3846871badc5fbddba4a0245450f84730275311b80cbed84f
Files
-
82e331c4b9b3e6c3846871badc5fbddba4a0245450f84730275311b80cbed84f.exe windows:6 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 361KB - Virtual size: 361KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.enigma1 Size: 22.6MB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE