Static task
static1
Behavioral task
behavioral1
Sample
ebd1dc52c6ecdd070a9bd2fe6052e819.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ebd1dc52c6ecdd070a9bd2fe6052e819.exe
Resource
win10v2004-20231222-en
General
-
Target
ebd1dc52c6ecdd070a9bd2fe6052e819.exe
-
Size
365KB
-
MD5
ebd1dc52c6ecdd070a9bd2fe6052e819
-
SHA1
eb64aac229955194d3a0bd6d1fe9a9f734d8a4ef
-
SHA256
08dea6882ddb3d346a7ea178bb95ba86ba1ac47a8119258fd902f8fb5ba54160
-
SHA512
a88d6824a7131a3bb3e7fae1314d41cb7e971b9691859adbb26efa00e1e1ef7fd9c9c0c02bb03b28ff43a22fbde30bd680a2dbd9110968dc76762b4ee718001b
-
SSDEEP
6144:SLhr+bIZrZL+TnqRTMdDVJJ8pnXunpWH3rF2dWVOfis9yMdnWFJ0htBuNhRI:Ohr+IZQrqRAdD+pXunQ7F2djdIJ0ht6k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ebd1dc52c6ecdd070a9bd2fe6052e819.exe
Files
-
ebd1dc52c6ecdd070a9bd2fe6052e819.exe.exe windows:4 windows x86 arch:x86
7b91331edb7b2ebb5d6fe00111def127
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
IsBadStringPtrW
TerminateThread
LoadLibraryW
PulseEvent
FindResourceA
LocalFree
CloseHandle
lstrlen
CreateMutexA
Sleep
SetLastError
CreateFileA
GetACP
GetEnvironmentVariableA
GetModuleHandleA
FindClose
TlsGetValue
GlobalUnlock
HeapCreate
user32
DrawEdge
CheckRadioButton
DrawMenuBar
DispatchMessageA
GetDC
CopyRect
IsWindow
CallWindowProcA
FillRect
DefWindowProcW
SetFocus
GetIconInfo
GetDlgItem
msasn1
ASN1BERDecBool
ASN1BEREncBool
ASN1BEREncEoid
ASN1BERDecNull
ASN1BERDecCheck
dpnet
DirectPlay8Create
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ