time
Static task
static1
Behavioral task
behavioral1
Sample
df217f323e80442ab012d13fe071c346.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df217f323e80442ab012d13fe071c346.exe
Resource
win10v2004-20240226-en
General
-
Target
df217f323e80442ab012d13fe071c346
-
Size
15KB
-
MD5
df217f323e80442ab012d13fe071c346
-
SHA1
58ea2690b0dd3dda2ef220e0f15630ad7677b0e7
-
SHA256
85bebdcfa5774a78b38665e2e8b2137dedc4dae143690bf18030e9be088e8209
-
SHA512
bfd7ebeb0d5f7c422e3bf0005074d673edb31b1e1a502c434656111aa1704711bd12a54375abef593cfa98e10ffe58267918967784c896abaf2ce3c5ede9ba62
-
SSDEEP
384:2b9AYLGe/CNikfS3CstOzJR9ItRGIX8168hiBuPW0hMw:0AYt/tkf8CstO5v0InMw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df217f323e80442ab012d13fe071c346
Files
-
df217f323e80442ab012d13fe071c346.exe windows:4 windows x86 arch:x86
9ae95b2395c1ae63ae1878c0b4509331
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
accept
inet_addr
bind
WSAStartup
gethostbyname
socket
setsockopt
htons
inet_ntoa
connect
WSAGetLastError
closesocket
select
__WSAFDIsSet
send
recv
shutdown
listen
kernel32
DeleteCriticalSection
InitializeCriticalSection
CreateThread
GetCommandLineA
CreateMutexA
GetLastError
GetCurrentThreadId
Sleep
GetTickCount
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
msvcrt
_snprintf
rand
realloc
atoi
strchr
strstr
_time64
_fullpath
free
sscanf
strncpy
srand
strtok
malloc
strrchr
sprintf
exit
gmtime
strncmp
isdigit
_strrev
Exports
Exports
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE