Static task
static1
General
-
Target
8b987270a29c1c2ac66850396e045cc6
-
Size
40KB
-
MD5
8b987270a29c1c2ac66850396e045cc6
-
SHA1
b1ef5f92f109c0340c70715f1733e141464a377c
-
SHA256
f005547a62d7f67d104b63fb029f7d14f63780949d936142bb5df85de94d194f
-
SHA512
88efb2a300cbea9f5fda298f9b4d22799bacaf485a22d18bbe1c47a6212c98e9046bc078485cf6471bf81e38de2ae960bf78b5ef313de90f33ae18778bd81cf0
-
SSDEEP
768:LTeMtyNV26FI0rylJxgMLLSpIzPXL5DWi6uSQSyYrftib0PP:5tyNpfO8WRjnSQOD9X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b987270a29c1c2ac66850396e045cc6
Files
-
8b987270a29c1c2ac66850396e045cc6.sys windows:5 windows x86 arch:x86
5f40e8092892d3f18ca25f9bbb4a0621
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmIsNonPagedSystemAddressValid
ExAllocatePoolWithTag
IoGetDeviceObjectPointer
strstr
KeBugCheck
_allshl
MmGetSystemRoutineAddress
RtlAnsiStringToUnicodeString
RtlInitAnsiString
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 384B - Virtual size: 356B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ