Static task
static1
Behavioral task
behavioral1
Sample
Bloxstrap-v2.5.4.exe
Resource
win10v2004-20231215-en
General
-
Target
Bloxstrap-v2.5.4.exe
-
Size
7.6MB
-
MD5
86e70ba4d13437f4d2fb369fc299f74e
-
SHA1
44fe25917fd50685dce4894058a159c460009065
-
SHA256
4d4e2f5a9c158c249cce76b59630ec81232371d41479f7a486737e7ef3409f1e
-
SHA512
9938d45075bf599b3dffcaa4205a0dc17876084610ff01cfb083a033259e74f4dbdbbf568f52c72bd234eb22afce246685c535bc0c0f1206e98e36c27d66aa00
-
SSDEEP
98304:Xkd5DSd5DxTsed5D2ZT00UuOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrTle:XJsdtObAbN0/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Bloxstrap-v2.5.4.exe
Files
-
Bloxstrap-v2.5.4.exe.exe windows:6 windows x64 arch:x64
Password: whaa11
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ