Static task
static1
Behavioral task
behavioral1
Sample
31ed784d005b87548e7420ac4c67e97692fb20d423e96aa593e583ebad6235d7.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
31ed784d005b87548e7420ac4c67e97692fb20d423e96aa593e583ebad6235d7.exe
Resource
win10-20240404-en
General
-
Target
31ed784d005b87548e7420ac4c67e97692fb20d423e96aa593e583ebad6235d7
-
Size
4.3MB
-
MD5
c8ffe9bfab30bbe1a239520435b4ac91
-
SHA1
ba05c29eb5403c93969232d9c7e8a5dac63daadc
-
SHA256
31ed784d005b87548e7420ac4c67e97692fb20d423e96aa593e583ebad6235d7
-
SHA512
86781aea63f94bc97e2dc6f1d177327546602144f3b84f716fe17906956c335ebb02bbeb5c10c5e76c5e58a2312603125fbe5901413436ae424834dd3b07864b
-
SSDEEP
98304:+Pk04xcTyZ6zWr+tLLjQ03k2fHnHbkzzK3GKvM57rcH+ucgEjKd1Zv:CGaCZr+1jFfHn2zK3u7pu0aXv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 31ed784d005b87548e7420ac4c67e97692fb20d423e96aa593e583ebad6235d7
Files
-
31ed784d005b87548e7420ac4c67e97692fb20d423e96aa593e583ebad6235d7.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ