Static task
static1
Behavioral task
behavioral1
Sample
6fc650297eb5bc60dca20879e0aa1bee277a2048e3303937dd1d781462879d12.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6fc650297eb5bc60dca20879e0aa1bee277a2048e3303937dd1d781462879d12.exe
Resource
win10v2004-20231025-en
General
-
Target
6fc650297eb5bc60dca20879e0aa1bee277a2048e3303937dd1d781462879d12
-
Size
3.8MB
-
MD5
ed7084db70231eec67bf21318e30dcf7
-
SHA1
964a95c1b30de62efa5cf6f695cfd1df90f3ea83
-
SHA256
8cb22156366d060094a042820466d2e302d5ea701b4303ab095dd06319101a23
-
SHA512
b4a9c311cd552cf14c4c6fec587375bc64f9e73e2d0ef125f65dd915a09d2196bf10438965ffb7ba1bf32ec6559573cf2892779a69b6484de1e896819d787d82
-
SSDEEP
98304:Nplv9hMBQFK2vVz5Ry67c8PIuIyjZzebdgX7Ik7c:NpZwYNu67dIOZeSXsk7c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6fc650297eb5bc60dca20879e0aa1bee277a2048e3303937dd1d781462879d12
Files
-
6fc650297eb5bc60dca20879e0aa1bee277a2048e3303937dd1d781462879d12.zip
-
6fc650297eb5bc60dca20879e0aa1bee277a2048e3303937dd1d781462879d12.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 195KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ