Static task
static1
Behavioral task
behavioral1
Sample
023f63677065e672158415782ce2ddd9a3a80304d64bccb1ed3a75903ea9e805.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
023f63677065e672158415782ce2ddd9a3a80304d64bccb1ed3a75903ea9e805.exe
Resource
win10v2004-20240412-en
General
-
Target
023f63677065e672158415782ce2ddd9a3a80304d64bccb1ed3a75903ea9e805
-
Size
124KB
-
MD5
5d1166f47fb3925087be7b2b705a0900
-
SHA1
4dd813f283e721e991a34417ec2be90cc7aaf6c7
-
SHA256
023f63677065e672158415782ce2ddd9a3a80304d64bccb1ed3a75903ea9e805
-
SHA512
463d6634a706bfe4a468fc7df622418ce441ceaa80c8e08ccd0af80ca6610e0bc4998683b8e7e62c5ffce10117b5a807ecf420cb86735189ecea72a312fbdf3a
-
SSDEEP
3072:JyFjfAF/fkKqExQmttcHELGUqUNINpyN3yATyc6:Jyr2Ln2HCyATyX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 023f63677065e672158415782ce2ddd9a3a80304d64bccb1ed3a75903ea9e805
Files
-
023f63677065e672158415782ce2ddd9a3a80304d64bccb1ed3a75903ea9e805.exe windows:4 windows x64 arch:x64
8faa4d4061855edd0a57f88818994747
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
PDB Paths
Imports
msys-intl-8
libintl_bindtextdomain
libintl_gettext
libintl_setlocale
libintl_textdomain
msys-2.0
__assert_func
__cxa_atexit
__errno
__getreent
__locale_ctype_ptr
__locale_mb_cur_max
__main
_dll_crt0
_impure_ptr
abort
argz_add
argz_count
argz_next
calloc
chmod
clock
clock_gettime
close
cygwin_internal
dll_dllcrt0
error
exit
fclose
fdopen
fopen
fprintf
fputs
fread
free
freopen
fwrite
getenv
getopt_long
getrandom
iswalnum
iswctype
lstat
malloc
mbrtowc
mbsinit
memchr
memcmp
memcpy
memmove
memset
mkdir
msys_detach_dll
nl_langinfo
open
optarg
optind
pclose
popen
posix_memalign
printf
pthread_mutex_destroy
pthread_mutex_init
pthread_mutex_lock
pthread_mutex_unlock
putc
puts
qsort
realloc
reallocarray
remove
rename
setlocale
snprintf
sprintf
strcat
strchr
strcmp
strcpy
strdup
strerror
strlen
strncat
strncmp
strrchr
strspn
strstr
strtoul
tolower
toupper
towlower
towupper
umask
vfprintf
wcrtomb
wctype
kernel32
GetACP
GetModuleHandleA
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 512B - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 576B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ