Static task
static1
Behavioral task
behavioral1
Sample
93c6af79df67c0e52d2b93aa40685f84.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
93c6af79df67c0e52d2b93aa40685f84.exe
Resource
win10v2004-20231215-en
General
-
Target
93c6af79df67c0e52d2b93aa40685f84
-
Size
20KB
-
MD5
93c6af79df67c0e52d2b93aa40685f84
-
SHA1
260bddd55609f84a7f2e565ca6325dfa72f509db
-
SHA256
088e8e6a14829cf9a4629ec001294c024e983c3bfe8d6e6cf8aa1871cabab4f9
-
SHA512
204822f5d7286672c9effd472a2fe819f261eb83104165ee03a3e19303e42ad560defe821d8b48105f73204419655a6bfe0d7cb8aa8c4ff079209616af37f4f9
-
SSDEEP
192:cNOPCTrI7tdoMkpw+VKX8l9ULEskjw7R8BBq7FHYscD74o:c9EDoMOw8KGU2jwt8B651cf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93c6af79df67c0e52d2b93aa40685f84
Files
-
93c6af79df67c0e52d2b93aa40685f84.exe windows:4 windows x86 arch:x86
e8b4760484fa6a7e37beace1851df046
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__main
abort
atoi
calloc
close
connect
cygwin_internal
dll_crt0__FP11per_process
exit
free
gethostbyname
getopt
htons
malloc
memcpy
optarg
perror
printf
pthread_atfork
read
realloc
recv
select
send
sleep
socket
strtoul
usleep
write
kernel32
AddAtomA
FindAtomA
GetAtomNameA
GetModuleHandleA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 176B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE