Static task
static1
Behavioral task
behavioral1
Sample
bee2161076ed782706f177928cf7423ecf995c2c12d8be200cbcbe150f672f86.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bee2161076ed782706f177928cf7423ecf995c2c12d8be200cbcbe150f672f86.exe
Resource
win10v2004-20240412-en
General
-
Target
bee2161076ed782706f177928cf7423ecf995c2c12d8be200cbcbe150f672f86
-
Size
64KB
-
MD5
3feacd00d157fcd56794b06dba35a43b
-
SHA1
b9bd58da5aeac2ffb97d2440a8ebf8967f6c7dd2
-
SHA256
bee2161076ed782706f177928cf7423ecf995c2c12d8be200cbcbe150f672f86
-
SHA512
5df7c98794064754eef8ea0eb5deaea12019bef16c63ba1b5dcfca318b3215af64995045039883009dd54ffa275a25a3106bcae8e9e273291f08bb7c51ed0e55
-
SSDEEP
768:iPcpfUThpi0W7XIb6GkYjO8dIBn4WBXHhbm3YGjs1HdySDgqMqf/1H5PXdnhKJD1:iPcpKpnW7/j/b8Yk/CvlHYE8Rm0Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bee2161076ed782706f177928cf7423ecf995c2c12d8be200cbcbe150f672f86
Files
-
bee2161076ed782706f177928cf7423ecf995c2c12d8be200cbcbe150f672f86.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jfbbql Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ