Static task
static1
Behavioral task
behavioral1
Sample
38f8e6bfcbe097ae540a846281ef7b84.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
38f8e6bfcbe097ae540a846281ef7b84.exe
Resource
win10v2004-20231215-en
General
-
Target
38f8e6bfcbe097ae540a846281ef7b84
-
Size
64KB
-
MD5
38f8e6bfcbe097ae540a846281ef7b84
-
SHA1
00b0c33cdac9e94b7c0d7a0cf911752f69f5f657
-
SHA256
e1ec96ed27e9cb22466962028d4580f74f5835e48f2449b1ec83bfb7ce391843
-
SHA512
0e2e367b835d9d233947070f3bd83b03fae17fcba93376598fa284149590e2d3afa1c7086d56bf5f80b4919636b96bbdbfd69aceefaa13790189a248b3963e26
-
SSDEEP
1536:NEtB9kE9ZXRMVgJZ1boIzvXjxJjggrEXP5/TBZ71sZa6p:W/9DVMKJZ68vXABXR7b1Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38f8e6bfcbe097ae540a846281ef7b84
Files
-
38f8e6bfcbe097ae540a846281ef7b84.exe windows:4 windows x86 arch:x86
cd9f7879b6d4a702cc240ea3b948f7af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
lstrlenA
lstrcpyA
lstrcatA
Sleep
GetLastError
HeapFree
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
GetModuleHandleA
lstrcmpA
lstrcmpiA
user32
wsprintfA
ws2_32
accept
ntohs
sendto
send
htons
connect
WSAGetLastError
select
bind
socket
ioctlsocket
setsockopt
shutdown
closesocket
recv
WSACleanup
WSAStartup
inet_addr
gethostname
gethostbyname
inet_ntoa
__WSAFDIsSet
listen
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
atol
_strlwr
_itoa
_stricmp
strchr
_strupr
strncmp
fopen
strstr
memset
atoi
memcpy
free
malloc
fclose
fwrite
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE