Static task
static1
Behavioral task
behavioral1
Sample
43853f89195dfedb72b3282a551a51e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43853f89195dfedb72b3282a551a51e9.exe
Resource
win10v2004-20231215-en
General
-
Target
43853f89195dfedb72b3282a551a51e9
-
Size
327KB
-
MD5
43853f89195dfedb72b3282a551a51e9
-
SHA1
0e06827831052318750bb883c5feb824705750d6
-
SHA256
113f166b9bbe8b8f552f6aee391003e4b724682539a0ff76cdd8162a4bf7cea9
-
SHA512
fc4ff233b03cb6cf0a490ef1b645875b1e6f78a7e6ab3a7f587b1b9e3a527478ea9e565a673c5dc82727d26fafdb2ef02a9268080774cef02dccce35609f0325
-
SSDEEP
6144:mGcOLhRbx+KE2nF9eCa2oQhcaZxmt+tEPNcjHGroqgMxxuqfSNFjM6OYbPwM:5cOLhRbx+KE2nF9eCaNQW0xmt+zarogW
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43853f89195dfedb72b3282a551a51e9
Files
-
43853f89195dfedb72b3282a551a51e9.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rol Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE