Static task
static1
Behavioral task
behavioral1
Sample
4f7621223d125b2f9bd681d396a9760e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f7621223d125b2f9bd681d396a9760e.exe
Resource
win10v2004-20231215-en
General
-
Target
4f7621223d125b2f9bd681d396a9760e
-
Size
2.9MB
-
MD5
4f7621223d125b2f9bd681d396a9760e
-
SHA1
e43aa3660b9cd1e5ea8c936f476e289a74798b43
-
SHA256
55bbec142437d5aa43112c85c26a7aa5165c06609dce498aa558d2f3d4ce47a6
-
SHA512
b2b1d026dddd24cc71a34363c14f55b4e3ab771d14f5508b8c57dec166e1fb248fa5d46bc732ba92168510863fcd744bc1eaf08180d6694526952c754c21a138
-
SSDEEP
49152:o6mbryS//RJIShfcOaebmx1KrCgB13jfXz62t:o6mbmS1cIXOgLv62t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f7621223d125b2f9bd681d396a9760e
Files
-
4f7621223d125b2f9bd681d396a9760e.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 22KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 64B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 302KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ