Static task
static1
General
-
Target
4f3836d5ab8df5bd85c1df52e4b782c3
-
Size
8KB
-
MD5
4f3836d5ab8df5bd85c1df52e4b782c3
-
SHA1
f47a72e31c0954c7d5887753193a4fe8c3090f4e
-
SHA256
75eb51f08221eba57be41dc2326852b11161a329015d3388a44c8559c63f3d0b
-
SHA512
8a094adacc129c98b5708bfc41538f875ed9e83d5f474c590bb9d71ebeba867a8f24a392e8e4a646cdf5a931ce0412ac3bd02b917f685a2fe5143f0b38d32d2c
-
SSDEEP
96:bBLx4a/CkS+wDO657zD3AjvtGDxz7KR9MyefRMVDHRuTfqPkqTC8AVTV8A0SHNWY:Br9S+dG3Y2xqZ0GMLLB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f3836d5ab8df5bd85c1df52e4b782c3
Files
-
4f3836d5ab8df5bd85c1df52e4b782c3.sys windows:5 windows x86 arch:x86
cfd699d0ba646297b082df8082549e2c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memcpy
IoDeleteSymbolicLink
RtlInitUnicodeString
IoDeleteDevice
MmGetSystemRoutineAddress
PsTerminateSystemThread
IofCompleteRequest
PsGetVersion
KeServiceDescriptorTable
ObfReferenceObject
IoCreateSymbolicLink
ObfDereferenceObject
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ