ReadUvotgvvxntc
Static task
static1
Behavioral task
behavioral1
Sample
54148d97ef7dd173a16ffded7a52d3fb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54148d97ef7dd173a16ffded7a52d3fb.exe
Resource
win10v2004-20231215-en
General
-
Target
54148d97ef7dd173a16ffded7a52d3fb
-
Size
32KB
-
MD5
54148d97ef7dd173a16ffded7a52d3fb
-
SHA1
7ef5c2d5871c11af3c4793e52f81645279417d77
-
SHA256
f7c1de3f5b74f0d239f4dae9176e8a9e60493b9f423646c02a3bcd42c72b47d0
-
SHA512
d6d19f883afcd57ced9ad7ca55498457ba53850d59581145c898e50f35bc5c19e6c46344801ad74eea78e8b9a87f01d60e437cd9266b84555255c23214e2c0ff
-
SSDEEP
768:Rl8l0vTng4dd8f9zIUfDJLUoIh+mkH/86t:TpnjEfOkfIFkf86
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54148d97ef7dd173a16ffded7a52d3fb
Files
-
54148d97ef7dd173a16ffded7a52d3fb.exe windows:4 windows x86 arch:x86
963f380713b35c5e8673210fe7fbb6b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
GetPrivateProfileSectionNamesW
SetConsoleCtrlHandler
GetTempPathW
GlobalGetAtomNameW
CreateFileMappingW
SetThreadContext
Module32NextW
GetTempPathA
FindFirstVolumeW
SetTimeZoneInformation
GetCommMask
user32
LoadBitmapW
DestroyCursor
wsprintfW
ScrollWindow
ClientToScreen
DlgDirSelectExW
GetMessagePos
VkKeyScanExW
Exports
Exports
Sections
CODE Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pack32 Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ