Static task
static1
Behavioral task
behavioral1
Sample
be02776f70381534ba8c7e1229e133e0.sys
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
be02776f70381534ba8c7e1229e133e0.sys
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
be02776f70381534ba8c7e1229e133e0.sys
Resource
android-x64-arm64-20240221-en
General
-
Target
be02776f70381534ba8c7e1229e133e0
-
Size
2KB
-
MD5
be02776f70381534ba8c7e1229e133e0
-
SHA1
bd48d41beb66b839009318475c8bf042c65f27f4
-
SHA256
9edb31d65d0cb09fe9fa4a71aa844f2fe57e25ab9aabac8156d3988781756aa8
-
SHA512
079ea4e3b70c38c78177d84517596b8969d48cc5ba9e938e36163e554a3e79b796caf3c0e6f77a34488d0953bb6f4b1afc99fc2464278b0774b5f776037d9398
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be02776f70381534ba8c7e1229e133e0
Files
-
be02776f70381534ba8c7e1229e133e0.sys windows:5 windows x86 arch:x86
d24c432078fe6596702e8bc864ce9ba3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
Sections
.text Size: 512B - Virtual size: 496B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ