Static task
static1
Behavioral task
behavioral1
Sample
4810c011295889f9d73cb199af4212cb7e74d7b64958f54373cc1f3111056bc2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4810c011295889f9d73cb199af4212cb7e74d7b64958f54373cc1f3111056bc2.exe
Resource
win10v2004-20231215-en
General
-
Target
4810c011295889f9d73cb199af4212cb7e74d7b64958f54373cc1f3111056bc2.exe.zip
-
Size
2.6MB
-
MD5
a83071001e37088e583e130b5db217e3
-
SHA1
67131254f05609f656b668bad66575fb4988c61f
-
SHA256
37e45b7df07002aecd86c5a367f0d35b31a137bea320c6139c516f806417bb8d
-
SHA512
70ea06c8a26efe8c24bbf59f1c2c43d885ee97356d609ed8b7dfe7affa6f5004f20acdc33f7cb988305ebea6938446396971976986159908dd512444e7477510
-
SSDEEP
49152:dEAVhV/Plr7b12EEJ/WHJj6DxvmK3+RGorjWEbXzTHCktBvi4Fl5En:ZDRlL1236jK3YryE7zTHtiIC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/4810c011295889f9d73cb199af4212cb7e74d7b64958f54373cc1f3111056bc2.exe
Files
-
4810c011295889f9d73cb199af4212cb7e74d7b64958f54373cc1f3111056bc2.exe.zip.zip
Password: infected
-
4810c011295889f9d73cb199af4212cb7e74d7b64958f54373cc1f3111056bc2.exe.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 7.8MB - Virtual size: 7.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.enigma1 Size: 128KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE