Static task
static1
General
-
Target
57bfff47bf53c8f0135b06cdda14c0d0
-
Size
5KB
-
MD5
57bfff47bf53c8f0135b06cdda14c0d0
-
SHA1
0f0569c22b43420112535841e022c68fb12d0bac
-
SHA256
e661feb328666bf6d7191277e9a7d30253632f1b361a6e6708ca37d707e6a68c
-
SHA512
81e9490634dd87f4a17c410de7ccb9d388dab1ce9995fc55ef4b28fdf49a7c71eafbe52075ff300f01871402e87966476b965552d4b4ae583d6c9b2b5fb42497
-
SSDEEP
96:e4HOeIp5xaJUOTkuJJcwTerIXMAPFY2gnC7u:nm50Jl4uJJN8IXMA9YxC7u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57bfff47bf53c8f0135b06cdda14c0d0
Files
-
57bfff47bf53c8f0135b06cdda14c0d0.sys windows:6 windows x86 arch:x86
c7df55dcb88944349d1811dbeb57af40
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitUnicodeString
IoDeleteSymbolicLink
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
IofCompleteRequest
KeServiceDescriptorTable
RtlAssert
PsGetCurrentProcessId
KeTickCount
RtlUnwind
KeBugCheckEx
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 454B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ