Static task
static1
Behavioral task
behavioral1
Sample
d11af28e7db11d708040d09ac96923aed800ddc7b39200ef09008c59e79502a9.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d11af28e7db11d708040d09ac96923aed800ddc7b39200ef09008c59e79502a9.exe
Resource
win10v2004-20231130-en
General
-
Target
8805eea3c9edeeaf5d3d53e3029775d5.bin
-
Size
6.9MB
-
MD5
2aa0dbffa923f469a20b6c784b1fd93e
-
SHA1
cde9170e49a49d016ddd22c1032dee843789a3f1
-
SHA256
24f329aa7a662bb4bf04c8ee115c08cfde4d4664cf7e92a9f4c7b18a61f05890
-
SHA512
5ebb13a54301bc13db2f42b1988d1f7e8508ee9422bcfc9996183e422b924073471c82e5210ea8ac3cb4c5904598651c21de8ee973635d854339e72ff466b99f
-
SSDEEP
196608:OyF+CPScAt8epMQBBB7uecf9kVVPgCJ+nKQymYBUA:Oq+eMhbBi9kVVPgFKQymux
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d11af28e7db11d708040d09ac96923aed800ddc7b39200ef09008c59e79502a9.exe
Files
-
8805eea3c9edeeaf5d3d53e3029775d5.bin.zip
Password: infected
-
d11af28e7db11d708040d09ac96923aed800ddc7b39200ef09008c59e79502a9.exe.exe windows:1 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ