Static task
static1
Behavioral task
behavioral1
Sample
9ae1049e0579fd8ef08a03d050571ff770d1c8957ddbf210e3257dd88e08c23d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ae1049e0579fd8ef08a03d050571ff770d1c8957ddbf210e3257dd88e08c23d.exe
Resource
win10v2004-20231215-en
General
-
Target
96c4dfbddec9361d035ce2ea9c1e1947.bin
-
Size
3.9MB
-
MD5
c22bf322e9cf61018d37dfc858583ce2
-
SHA1
8a4ce570a2cb78d23ba0397b6eef5fe4993e5beb
-
SHA256
2e40b4dc1742467ce2579b39972d033e096be22310e5ea464d5e4e3678e42462
-
SHA512
e631b8f83e09811c16a3b962d886f8568d1b70a602a1777e18275cd96bcc808a56f27ac6c05a825e04cf04232a0c188796ee6c962435741b649329f8d0eb9de6
-
SSDEEP
98304:km06EMjNx6fQx3QbpZIad3aWru8OzswRLk/VzaQAVrf:km06Eyf6fK3QbbIUqWy8Ozs2OMVrf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9ae1049e0579fd8ef08a03d050571ff770d1c8957ddbf210e3257dd88e08c23d.exe
Files
-
96c4dfbddec9361d035ce2ea9c1e1947.bin.zip
Password: infected
-
9ae1049e0579fd8ef08a03d050571ff770d1c8957ddbf210e3257dd88e08c23d.exe.exe windows:1 windows x86 arch:x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ