Static task
static1
Behavioral task
behavioral1
Sample
51aaa758caf261bda9b488e704de8c9c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51aaa758caf261bda9b488e704de8c9c.exe
Resource
win10v2004-20231215-en
General
-
Target
51aaa758caf261bda9b488e704de8c9c
-
Size
554KB
-
MD5
51aaa758caf261bda9b488e704de8c9c
-
SHA1
972e59e02dd7b0c817e84cfcd8b31d59aed18442
-
SHA256
85bb2b1e57d30882db9bda94bffce8a4fb899bdabb94c12fe7776a8713c37779
-
SHA512
a6fbe68b43f668dacc006824a567bd1ee0316868133dcd7a05f53b85f4f93e614f5276b1f91f29f3b9d514ad13645072dbae4a9fcb00f628a35412d67fc0ae07
-
SSDEEP
12288:QyR8qA4JlH3jfKk41dhK/lGRgOUqmq9kR6lhKXhB3a9FsqJKB57d8fu:QCr3r4K/cRgOnmq9g6IB36rKX6W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51aaa758caf261bda9b488e704de8c9c
Files
-
51aaa758caf261bda9b488e704de8c9c.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
Size: 169KB - Virtual size: 584KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 46KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 306KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE