Static task
static1
Behavioral task
behavioral1
Sample
51b084661f456585b6b2ede38f8516d0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
51b084661f456585b6b2ede38f8516d0.exe
Resource
win10v2004-20231222-en
General
-
Target
51b084661f456585b6b2ede38f8516d0
-
Size
91KB
-
MD5
51b084661f456585b6b2ede38f8516d0
-
SHA1
80ad2765772346921cd4ffc597e4b4f550b3a74e
-
SHA256
e2588c7d5fc315bebc88d23032c381492765509da74ae5158f438b303d6df8f0
-
SHA512
12548424c8c45533a3fc2968fc030cba50e5e6065ff22b43893cb53ade0d800c3b0564a694e371c3b43d8809e477bbeecc68abb1fa99e08522fc0f179f0448f4
-
SSDEEP
1536:Vk3RzRb3s/lYWMLO4wo9Kg2TUKBZDCRdQnxLGHoKpA81g3lnAqh1KJ:8NRb36lYWnoITUimqxWoqUNJ1+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51b084661f456585b6b2ede38f8516d0
Files
-
51b084661f456585b6b2ede38f8516d0.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 892B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
123 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE