Static task
static1
Behavioral task
behavioral1
Sample
d6fa3155094f3765c64092743e10604a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d6fa3155094f3765c64092743e10604a.exe
Resource
win10v2004-20240226-en
General
-
Target
d6fa3155094f3765c64092743e10604a
-
Size
436KB
-
MD5
d6fa3155094f3765c64092743e10604a
-
SHA1
085f013b36442962c99ed6352f570bc80097bbc8
-
SHA256
96f1fc588a38fcb04efca985cdd863e372057ae2ed42964341de61599f03645a
-
SHA512
7a9b3217e86347859ce91da44e76aeb776a180de4ec76e7dec35e57901e0b2ff5a7c461e44d6fa26891854c3a55ac2592ca071e1ba72dbee7caffee2f383f6be
-
SSDEEP
6144:moaSgL6dVa3FZhjUATiVwk9DGUYj7iMGOAiC/eaLL8OEL/8nGnxOkH/kwqspSGVj:m+gAiIHomMdny8OYLO6/nqlGey
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6fa3155094f3765c64092743e10604a
Files
-
d6fa3155094f3765c64092743e10604a.exe windows:4 windows x86 arch:x86
83bb4916b299a67b27446180100257ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlPrefixString
RtlSplay
PfxInsertPrefix
kernel32
GetSystemDefaultLCID
GetCurrentProcessId
GlobalFix
user32
GetClipboardOwner
Sections
.text Size: 432KB - Virtual size: 432KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 341B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE