Static task
static1
Behavioral task
behavioral1
Sample
f980a70c08226ba43a6a467699e97e7aa2fecd0fea5e4e40af347c356dbb643e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f980a70c08226ba43a6a467699e97e7aa2fecd0fea5e4e40af347c356dbb643e.exe
Resource
win10v2004-20231215-en
General
-
Target
f980a70c08226ba43a6a467699e97e7aa2fecd0fea5e4e40af347c356dbb643e
-
Size
4.5MB
-
MD5
8469603c550a4d1f09b8d5d98669a3e8
-
SHA1
0ff41e45e853e656ebfcc77d9b94fb21a78d53f6
-
SHA256
f980a70c08226ba43a6a467699e97e7aa2fecd0fea5e4e40af347c356dbb643e
-
SHA512
59f909d2905a4942575aca076474a9b468b17818ac7b4193a0eb9681aa9c7c7390274982f223d58b6231eea2d7067ca0ee779f2c88716b3de569707b76e69e7c
-
SSDEEP
49152:egZXuYutuoj0CAL8qlw4lm+SJ64rfSNyoJIa5YZXhwGbp/TegiMmVRyZunqwBYdH:oY+ufCgw4WJL5emwmT8BMZoBuyeqYal8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f980a70c08226ba43a6a467699e97e7aa2fecd0fea5e4e40af347c356dbb643e
Files
-
f980a70c08226ba43a6a467699e97e7aa2fecd0fea5e4e40af347c356dbb643e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 344KB - Virtual size: 669KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 416KB - Virtual size: 927KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 28KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 24KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.winlice Size: - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ