Static task
static1
Behavioral task
behavioral1
Sample
9e3710ca86de87ed0aeb16b86676fcca21c719e741f4de7973ce77e357ff1a14.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
9e3710ca86de87ed0aeb16b86676fcca21c719e741f4de7973ce77e357ff1a14.exe
Resource
win10v2004-20231023-en
General
-
Target
1d0ef5fde16698f163a7bc350d18ba11.bin
-
Size
1.1MB
-
MD5
8098e8ada4096026fa187a23d845d1f3
-
SHA1
7cb9b199d95827dfd5eae4a9938d79a8b21738ca
-
SHA256
bb9484caf4fcc1c9e22df690f3a5229d082253dd6aed2b0a34dce5e8964e4b96
-
SHA512
ff6fd4afc75b0c3812cd9979c2b1aeeaf7ba177068f7388e4221363976424d2412bb8c1b1c6287051531197231b3e74614b594821904a78a77c6ca8cb6bf2747
-
SSDEEP
24576:q6gpi/v9oajoS0LoLf8Mk5VEnEbQDziSHtzcf9IbFUEEh4oDhsOJbICGH:q6gA/ghLEEMkPEEbwhk6ZoDuOJbIB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9e3710ca86de87ed0aeb16b86676fcca21c719e741f4de7973ce77e357ff1a14.exe
Files
-
1d0ef5fde16698f163a7bc350d18ba11.bin.zip
Password: infected
-
9e3710ca86de87ed0aeb16b86676fcca21c719e741f4de7973ce77e357ff1a14.exe.exe windows:4 windows x86 arch:x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 392KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ