Static task
static1
Behavioral task
behavioral1
Sample
6f2bd0a118e3cb21a82c2cc0f4ae89dfc3187321ae34b39270c51f4cc0fe250a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6f2bd0a118e3cb21a82c2cc0f4ae89dfc3187321ae34b39270c51f4cc0fe250a.exe
Resource
win10v2004-20231023-en
General
-
Target
c9e26277dece15561ac1f9dae3701100.bin
-
Size
1.1MB
-
MD5
e349dc5f0e0fda43115bb3d9c2fe048b
-
SHA1
f7b09b7d66be8fb45bf0605dc2d2a2e896f495f6
-
SHA256
77bd12a5a0800d9c7ae784ca6866d2289bdda9382c9d47829cbb28d2b930864c
-
SHA512
692d465db5528ca6f9c831966a430e2db8825f44dcf642c19ca695793b467c16abfe435b62e9f561bd60d0fa98e9127324d453568e8cd8989237d6de93d72dc7
-
SSDEEP
24576:uTKe7yVLVaeU0Q5DrDMUhgLvsV7T1UydJX8ynwskP/kiBJ4es:cqw0aowUv27TRdtwsY/kiBJ4es
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/6f2bd0a118e3cb21a82c2cc0f4ae89dfc3187321ae34b39270c51f4cc0fe250a.exe
Files
-
c9e26277dece15561ac1f9dae3701100.bin.zip
Password: infected
-
6f2bd0a118e3cb21a82c2cc0f4ae89dfc3187321ae34b39270c51f4cc0fe250a.exe.exe windows:4 windows x86 arch:x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 340KB - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ