Static task
static1
Behavioral task
behavioral1
Sample
d49e8577a52d1ebad5c4ec463eae4220.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d49e8577a52d1ebad5c4ec463eae4220.exe
Resource
win10v2004-20231222-en
General
-
Target
d49e8577a52d1ebad5c4ec463eae4220
-
Size
503KB
-
MD5
d49e8577a52d1ebad5c4ec463eae4220
-
SHA1
0f8e34bdd53fa19c350dad7a7664134d4095e032
-
SHA256
1b389fab485c3a37fcce9e87746146146ec996b2a9195151e551c14dc964d823
-
SHA512
1f516e83ebb4d7ea0084f77f12ac87f5f760b544d4a17d3bf9d8742eafab5756c123c250d1336cbe7a4ff199598977df404b1755c8c94153b1aba58b3da2fd93
-
SSDEEP
12288:2UyUdZO+DxasWBE/+77yBHh/+Z/cfFZCIbIzLJoVh:2OdZO+DxasWG/nBHh/aIjIuV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d49e8577a52d1ebad5c4ec463eae4220
Files
-
d49e8577a52d1ebad5c4ec463eae4220.exe windows:5 windows x86 arch:x86
0cbe52b925693a176100d2e9b983d776
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
GetTickCount
SetVolumeLabelA
FoldStringA
GetCurrentProcess
HeapCreate
GetShortPathNameW
GetPrivateProfileIntW
SetEnvironmentVariableA
SetCurrentDirectoryA
CreateMutexW
GetVolumePathNameW
SetStdHandle
GetConsoleTitleA
LeaveCriticalSection
DeleteFileA
GetStringTypeA
lstrcpyA
LoadLibraryA
aaclient
LoadClientAdapter
g_fnStartTransport
OpenKeyReader
OpenKeyReaderWriter
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 1024B - Virtual size: 726B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fdata Size: 491KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ