Static task
static1
Behavioral task
behavioral1
Sample
ca64d38c0c36f735c4b43f4c09cdc609.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca64d38c0c36f735c4b43f4c09cdc609.exe
Resource
win10v2004-20240226-en
General
-
Target
ca64d38c0c36f735c4b43f4c09cdc609
-
Size
552KB
-
MD5
ca64d38c0c36f735c4b43f4c09cdc609
-
SHA1
1b50e0af07e80c0d0bf55f3d3efab3237294f492
-
SHA256
57ab17f68945fbc5c35d844f8070d5129976ccb23816aa4d6dc7148717b3e768
-
SHA512
8baebe50c6b4723d6bdb0309b39febfbd938abf1c52404709e8412636dbb69918b1491be401fce4530b01b074cc6694cd0a562098132737ee52c334db3d613ee
-
SSDEEP
12288:yfIIcMnw0L0bImWDapXS4vB4YoF54k0PB/pyAww8y2F7/:qIIHnw0tLDkXS4+Y1k0PBBcwT2Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca64d38c0c36f735c4b43f4c09cdc609
Files
-
ca64d38c0c36f735c4b43f4c09cdc609.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 462KB - Virtual size: 462KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.arma Size: 50B - Virtual size: 50B
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ