Static task
static1
Behavioral task
behavioral1
Sample
6824fc6b41aa1f5c2e4ca9cd85ada07bef5f55e73b83cbf1bef19aeffc121c2b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6824fc6b41aa1f5c2e4ca9cd85ada07bef5f55e73b83cbf1bef19aeffc121c2b.exe
Resource
win10v2004-20240226-en
General
-
Target
6824fc6b41aa1f5c2e4ca9cd85ada07bef5f55e73b83cbf1bef19aeffc121c2b
-
Size
99KB
-
MD5
fd40df976a0c580325a14c8bbb0cef33
-
SHA1
99f399848e77c3920874c8740ce50fe22eda81a8
-
SHA256
6824fc6b41aa1f5c2e4ca9cd85ada07bef5f55e73b83cbf1bef19aeffc121c2b
-
SHA512
e25d8b4443280128e5ac90bd3d0ec398d178466d1f3c7861daf6849ef1ff7dfb3bee2717884c29739bc7c0a0c72ccba3a235a77b4aea123aa0247e21b703cdac
-
SSDEEP
768:Z0Y/YMsvlMdwPK80GQuG0uyEUQ69IR1sGNt2S1eu1uVH:SYQbN/PKwNgp699GNtL1ex
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6824fc6b41aa1f5c2e4ca9cd85ada07bef5f55e73b83cbf1bef19aeffc121c2b
Files
-
6824fc6b41aa1f5c2e4ca9cd85ada07bef5f55e73b83cbf1bef19aeffc121c2b.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata6 Size: 1024B - Virtual size: 814B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata4 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata3 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata2 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ