Static task
static1
General
-
Target
551123f269261ff50c4a50d8dde084f8
-
Size
27KB
-
MD5
551123f269261ff50c4a50d8dde084f8
-
SHA1
919bb6fe8bd7ed03db83b5c6ecef2e9d04814637
-
SHA256
73e61a8129ebe79cd8486d9f9c399cb60422b1bf8625079df67cdaf01bfaf3df
-
SHA512
61534360c690a27ecc941c2f4107655a59e733ed69d2f6690cb5f5dd63a025d5196ebd083f4d1f708d31d9cf28c17152e89fe10b832ef79ac7762f9e8fd975ae
-
SSDEEP
768:8UzbrFBzIi1FhBEKN0lP30ADs1mNJmH/9Aq0hl:Vzbrb//hBErP3DscNQHVAqM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 551123f269261ff50c4a50d8dde084f8
Files
-
551123f269261ff50c4a50d8dde084f8.sys windows:4 windows x86 arch:x86
b0ee5d766d3a8cd55dac88af5c254e0e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
swprintf
RtlAnsiStringToUnicodeString
strncpy
_strnicmp
_wcsnicmp
wcslen
MmGetSystemRoutineAddress
ObfDereferenceObject
wcscat
wcscpy
_itow
_except_handler3
strncmp
IofCompleteRequest
_stricmp
ExFreePool
_snprintf
ExAllocatePoolWithTag
ZwClose
ZwOpenKey
RtlCopyUnicodeString
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 832B - Virtual size: 806B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ