Static task
static1
Behavioral task
behavioral1
Sample
594ed27821111c027499e8cb79c71550.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
594ed27821111c027499e8cb79c71550.exe
Resource
win10v2004-20231215-en
General
-
Target
594ed27821111c027499e8cb79c71550
-
Size
2.8MB
-
MD5
594ed27821111c027499e8cb79c71550
-
SHA1
8fa1ca2c2247a16a24ac48d02dd9a54a9be265de
-
SHA256
6b174cea763e8931dc560759685b9689cb67684a92ea34bd132be9e301340b63
-
SHA512
632dcbef286562f29fcad45384d6cc29f575652171547f24d9629ebef4e6d77c1d24c2dc7413389d7d24be6b4d8df5dcc835af860bf850823d938f0ab7f74528
-
SSDEEP
49152:FzHOTfsTjuOuLxo4/3DvyIv+CblBd0rx1zMeWNYxGvFfGniRs6+hb/H/9ejZxBke:F7p6LpdnmaQGvFtx+51e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 594ed27821111c027499e8cb79c71550
Files
-
594ed27821111c027499e8cb79c71550.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 363KB - Virtual size: 804KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.x01 Size: 2.4MB - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yP Size: 12KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE