Static task
static1
Behavioral task
behavioral1
Sample
538258e1cba7de87cedcffec983808e5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
538258e1cba7de87cedcffec983808e5.exe
Resource
win10v2004-20231215-en
General
-
Target
538258e1cba7de87cedcffec983808e5
-
Size
124KB
-
MD5
538258e1cba7de87cedcffec983808e5
-
SHA1
e29275ffc67c7790f80cfc19790e514e4227bbee
-
SHA256
c6fe954872565637df80babaa95aa7501a0f512e27355a6738c37c080112af1a
-
SHA512
411497b1d3473cf663a40f6715d7a77ab84e3509a984a3ce0ead0403375d4600450d1ea2ff48360f8ee679366f257faccb726b1b55bad85d6cb49147017afd41
-
SSDEEP
3072:Rx53+d/gfo6eGregSToJ094ZD+vvS2yt4Y1Lcly:RP+ife5gcoJi4CvSN9Bcly
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 538258e1cba7de87cedcffec983808e5
Files
-
538258e1cba7de87cedcffec983808e5.exe windows:1 windows x86 arch:x86
b6fb89fcc6ef29d8fe7890630dcab598
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
kernel32
GetCommandLineA
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
CreateFileA
ReadFile
RtlUnwind
SetFilePointer
WriteFile
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
crtdll
__GetMainArgs
exit
free
malloc
memset
raise
rand
signal
srand
strcat
strchr
time
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 596B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 176B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 924B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE