Static task
static1
Behavioral task
behavioral1
Sample
1f80a5027a30b618996426f0c02d630d7b275351f524fd9b5644e9f6db779be9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f80a5027a30b618996426f0c02d630d7b275351f524fd9b5644e9f6db779be9.exe
Resource
win10v2004-20231222-en
General
-
Target
b6229695d985886bba02cff6677df2ca.bin
-
Size
1.3MB
-
MD5
5986b1eb91df2c734a273264759a3f93
-
SHA1
ea50926753ca95fd0f317285cd410f53c17d2511
-
SHA256
e862db2335ae1f36956da09d9abbf7e87d23dd629d88524c45e75bb50eb0c548
-
SHA512
d6b3d2bdf5a1be41655d3c8420e5208676d376570280dd1443c724ef8ee0ed69b6f6773f7afa015e482e91cfeb98c8ebb6ea79ea9bfa3ca334d2254f2132db58
-
SSDEEP
24576:u+8OPpYNo+APEFw8wPlvb7J4dCzoS1X8ZsJNqLtI/fJz52Zm+M:78OPpYNoV2uTgCRX8Zlh4hz5y7M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1f80a5027a30b618996426f0c02d630d7b275351f524fd9b5644e9f6db779be9.exe
Files
-
b6229695d985886bba02cff6677df2ca.bin.zip
Password: infected
-
1f80a5027a30b618996426f0c02d630d7b275351f524fd9b5644e9f6db779be9.exe.exe windows:4 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 245KB - Virtual size: 584KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 174KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 909KB - Virtual size: 912KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE