Static task
static1
Behavioral task
behavioral1
Sample
b6068fc71f31ee2e157ab7be35562ac2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6068fc71f31ee2e157ab7be35562ac2.exe
Resource
win10v2004-20240226-en
General
-
Target
b6068fc71f31ee2e157ab7be35562ac2
-
Size
5KB
-
MD5
b6068fc71f31ee2e157ab7be35562ac2
-
SHA1
4b7557fb7c015fffde230af0aa02768a3431181a
-
SHA256
e12608e7f6a90198bb62c80c76df09f801a31eb4d01def1159c6b8ad9d4bc5cf
-
SHA512
76f9286fcaacce16bc3bb99a5f923445d7260ad1f3d4576df3643a240c304051e928b9d3714b0f0ca67ab63f3b9265b68274b262b3459cc73372514b55d14b8d
-
SSDEEP
48:6Ifm2/o09aZ8VYvaaaC97lzI4nWBGfxO3KHbyueJFVDoUSyiDIop6ToQJO3Qly:d+2/HVYv9792GfxO3KHbylDcsw6TQV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6068fc71f31ee2e157ab7be35562ac2
Files
-
b6068fc71f31ee2e157ab7be35562ac2.exe windows:4 windows x86 arch:x86
57e9dfcc662199048420d4d14e902a7b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__main
_dll_crt0@0
_impure_ptr
calloc
cygwin_detach_dll
cygwin_internal
dll_dllcrt0
execv
free
malloc
memcpy
realloc
strcpy
strlen
strrchr
kernel32
GetModuleHandleA
GetProcAddress
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 296B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 548B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE