Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Backdoor.Win32.Tiny.exe
Resource
win7-20240221-en
General
-
Target
HEUR-Backdoor.Win32.Tiny.gen-1cf30a8c90c6d69df9ea3670b04405534a3ca9232267bfe41b6ee438adf9367a
-
Size
58KB
-
MD5
df2e80b41321dcec85de75a2fb4c573e
-
SHA1
450be3a035b8f8b02cc4b1fee595f0e28f7220bb
-
SHA256
1cf30a8c90c6d69df9ea3670b04405534a3ca9232267bfe41b6ee438adf9367a
-
SHA512
8d64ba37b8c8b0609a11a9bbe8cc679f0be660fa473429fa1374588fd3cb616e9f37fddeb2a6f349dbd299ff3c1e55b584e71aa26a735a817c3f7df6e99497a2
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIhJlc:ymb3NkkiQ3mdBjFILC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HEUR-Backdoor.Win32.Tiny.gen-1cf30a8c90c6d69df9ea3670b04405534a3ca9232267bfe41b6ee438adf9367a
Files
-
HEUR-Backdoor.Win32.Tiny.gen-1cf30a8c90c6d69df9ea3670b04405534a3ca9232267bfe41b6ee438adf9367a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 47KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
petite Size: 274B - Virtual size: 274B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ