Static task
static1
General
-
Target
Warrior.exe
-
Size
3.0MB
-
MD5
77af0ed58685722c2f9596fed1e5bd84
-
SHA1
0a09622ffbc63932f11af84934d256d5e790ffeb
-
SHA256
0545c17e579fc2df5185855e51425ec4d32da26075c02a0cf1af0221aa9b9a18
-
SHA512
e557de1d3a4115276520ed5775c7a6fb5688cf40021b62ed5243c03783d1ad09722190f0234006c16cb9978982541c4eabd6ffefbfc1d063d341d4cf620ff140
-
SSDEEP
3072:XVbxrc9pqjTrUWHdkxq+G3DmWuQk/moeRiR85MpMj:FbVQgzHkAyWunbje
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Warrior.exe
Files
-
Warrior.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ