Static task
static1
Behavioral task
behavioral1
Sample
dbfed1f26e4392a865fec32407ce02cef8051ce5cfa2b2a72bf19b3cc0d9543a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
dbfed1f26e4392a865fec32407ce02cef8051ce5cfa2b2a72bf19b3cc0d9543a.exe
Resource
win10v2004-20231215-en
General
-
Target
dbfed1f26e4392a865fec32407ce02cef8051ce5cfa2b2a72bf19b3cc0d9543a
-
Size
4.6MB
-
MD5
b91f21798aaaa735455a10253645ec95
-
SHA1
5034dcae7b5b703f4795d852bd2d8811dc219019
-
SHA256
dbfed1f26e4392a865fec32407ce02cef8051ce5cfa2b2a72bf19b3cc0d9543a
-
SHA512
d294b3315b21f370e1107d0fcc684801b1a9a793f9250286d667a6036fd8c86198a764bfce0f7a1b704dd40dbb49cb81dc112fc5d0e9b83962bf6b03bfe51ee2
-
SSDEEP
98304:QWTfwQHKtF308dqI27x6nUk7WXIYWhuk+mmwu5jawC9zyf0iH4dm8:b7wQF4Hox0UEYWh6Pwu5jE9yr4dD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dbfed1f26e4392a865fec32407ce02cef8051ce5cfa2b2a72bf19b3cc0d9543a
Files
-
dbfed1f26e4392a865fec32407ce02cef8051ce5cfa2b2a72bf19b3cc0d9543a.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ