Static task
static1
Behavioral task
behavioral1
Sample
5bd99776eec867de65860bafd8b2f76c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bd99776eec867de65860bafd8b2f76c.exe
Resource
win10v2004-20231215-en
General
-
Target
5bd99776eec867de65860bafd8b2f76c
-
Size
13KB
-
MD5
5bd99776eec867de65860bafd8b2f76c
-
SHA1
4aa1bc710b27f5e310f9b57553da9767203c81a0
-
SHA256
017d9af840c76f4742b40e03a063fc02257e1f61b5f7a6aa201df211aa17a2b1
-
SHA512
e3f9971ef1e11a2a34b7eb700daa282dcd3d63c2638721e2088e8f57af68d0d4c240c5be45ba084b75ebe3c27201d290e8cf0d7094d26547632bfddf460f8f42
-
SSDEEP
96:nPIV00RvXovRefYFGm/MVcJ0T3DOAdWUn3/6E7XvNG9XgkTRVa7gi8wOVoPpyLvW:ngVXXkeQFGslJUhBDNGZgkT6ZC+3HLd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bd99776eec867de65860bafd8b2f76c
Files
-
5bd99776eec867de65860bafd8b2f76c.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upzj Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PEPACK!! Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upzj Size: 85B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ