Static task
static1
Behavioral task
behavioral1
Sample
2b1fed2ea6c60f4ab2e657bb20d60d0acda9deea0795efe50c4eb2e31f7312e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b1fed2ea6c60f4ab2e657bb20d60d0acda9deea0795efe50c4eb2e31f7312e9.exe
Resource
win10v2004-20231215-en
General
-
Target
b72b779bdb84b023fbcb032c434b1470.bin
-
Size
1.3MB
-
MD5
0d94ada188b1e377ca6940261eac9f0b
-
SHA1
5e14e834604f3a7631c83f929fafe46f67da4df9
-
SHA256
120caad990cb0589c0ee11b9db65a2698a6e443b3c5db7e7d2019fc39fb1260f
-
SHA512
454dd9eb4a2709245834470a5a6421e24b9c907388e33381caaecc6d48e018b027b8b1bf9afac17030ec12c145e72e833ed73d85dcd6df8a843784a6f1f4fdba
-
SSDEEP
24576:W7S4osaje0oIEYbjRv/5+CmI140aCOndqZvr8ZK/Zte2aX5mhDiY:WW081ogbjRv/9mI14VdqZvYgeFpy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2b1fed2ea6c60f4ab2e657bb20d60d0acda9deea0795efe50c4eb2e31f7312e9.exe
Files
-
b72b779bdb84b023fbcb032c434b1470.bin.zip
Password: infected
-
2b1fed2ea6c60f4ab2e657bb20d60d0acda9deea0795efe50c4eb2e31f7312e9.exe.exe windows:4 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 212KB - Virtual size: 528KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 174KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 907KB - Virtual size: 912KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE