Static task
static1
Behavioral task
behavioral1
Sample
258a0f85a6f484c180b7b0673f117baa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
258a0f85a6f484c180b7b0673f117baa.exe
Resource
win10v2004-20231215-en
General
-
Target
258a0f85a6f484c180b7b0673f117baa
-
Size
138KB
-
MD5
258a0f85a6f484c180b7b0673f117baa
-
SHA1
7569ab6fb3f0038d2a6bce98fa1af5822ae32625
-
SHA256
e541344597548b39b55c7233cd475de8b83d18c2fcb51d59efa9076713bca987
-
SHA512
b651ed947a2d5665fd86d294b635ab4f7238b8e2f69138196d754631bacb54b7b94527df49c46076bdb6f10ce8002cba54b89869d955c7a9ff11fdd2346813fe
-
SSDEEP
3072:3RNeNk6m8qhVSrKCT6JxjElXuwdzbKu6e3IyRzyb8:3RNglqhVL3JxjwpdzWujI6yb8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 258a0f85a6f484c180b7b0673f117baa
Files
-
258a0f85a6f484c180b7b0673f117baa.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 842KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 343KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE