Static task
static1
Behavioral task
behavioral1
Sample
191490cf96aff9eaef0cbc185115b358898f5e590eb9cb3eb5398af14523a853.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
191490cf96aff9eaef0cbc185115b358898f5e590eb9cb3eb5398af14523a853.exe
Resource
win10v2004-20240426-en
General
-
Target
mald.zip
-
Size
27KB
-
MD5
a7b46357dfabadc54745f605ccd100d8
-
SHA1
fe4c0788ae4305ef44dd54f3c005125ea29fa63a
-
SHA256
8c422c9a47fdce23f5466cf640bbe4e9c7c0266ad6c78d5b4b8c59d4384d8e25
-
SHA512
2d5c9c6481d02691b51592ed927a0e61483bf5ea73f290cf2e053b18e6623d5be6954dd2dde989cf81119eb1dc60009c6eb5851ff16def2fd90fae13fa492ae4
-
SSDEEP
768:LrbQ1KP/li4KCVHyFUs7zZrltASkXc1V45+GZjukA+2Jm:81e/MN2yFUEz1XWXc1V4puf+2Jm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/191490cf96aff9eaef0cbc185115b358898f5e590eb9cb3eb5398af14523a853
Files
-
mald.zip.zip
Password: infected
-
191490cf96aff9eaef0cbc185115b358898f5e590eb9cb3eb5398af14523a853.exe windows:4 windows x86 arch:x86
Password: infected
a04f32913d3ef18e07d2c1e3f373c264
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
Sleep
CreateDirectoryA
GetTempPathA
GetModuleFileNameA
GetTickCount
LCMapStringA
SetEndOfFile
LoadLibraryA
GetOEMCP
GetLastError
DeleteFileA
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapFree
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
WriteFile
ReadFile
GetProcAddress
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
HeapAlloc
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
CreateFileA
GetCPInfo
GetACP
LCMapStringW
shell32
ShellExecuteExA
winmm
timeGetTime
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ