Static task
static1
Behavioral task
behavioral1
Sample
597740f92ebbf3b40a0247b02644a2f8a013fa09161eeb9eb53154e18d5bb23e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
597740f92ebbf3b40a0247b02644a2f8a013fa09161eeb9eb53154e18d5bb23e.exe
Resource
win10v2004-20240412-en
General
-
Target
597740f92ebbf3b40a0247b02644a2f8a013fa09161eeb9eb53154e18d5bb23e
-
Size
64KB
-
MD5
42c149f980292c3342bbd360e5a8f749
-
SHA1
6eb8370c659747d14dcded99d7a6cb5877d29ae0
-
SHA256
597740f92ebbf3b40a0247b02644a2f8a013fa09161eeb9eb53154e18d5bb23e
-
SHA512
feac44b8d7ec619468ed7317d2570cbcaa4e716c248e10f0b366f15f1019d5fd72795657072d5ba246df6aff608092adfbcb6d094ed3a980b42c1a928ed5bd5c
-
SSDEEP
768:Vi1jtMwRn+DLdkrPNOgTZreO+jraVA5W+gZgl7N/9LtzYvJc8zqMqf/1H50XdnhM:Vi1jY3Uhq75tgZsPGG8Ovl0YE8Rm0Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 597740f92ebbf3b40a0247b02644a2f8a013fa09161eeb9eb53154e18d5bb23e
Files
-
597740f92ebbf3b40a0247b02644a2f8a013fa09161eeb9eb53154e18d5bb23e.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jfbbql Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ