Static task
static1
Behavioral task
behavioral1
Sample
195fa1e3d9a33dcc265dc16147d4922a982de029df3cb7c661b6e440064901f5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
195fa1e3d9a33dcc265dc16147d4922a982de029df3cb7c661b6e440064901f5.exe
Resource
win11-20240508-en
General
-
Target
195fa1e3d9a33dcc265dc16147d4922a982de029df3cb7c661b6e440064901f5
-
Size
4.3MB
-
MD5
75cab99147852b877aeec544e91fdf03
-
SHA1
da7ce098bd485975f3636e8992a134add49da77e
-
SHA256
195fa1e3d9a33dcc265dc16147d4922a982de029df3cb7c661b6e440064901f5
-
SHA512
acc1a3a44c2fbeb8438e7be9e9151fd6115953e0ec767a7a2891b96dc8ea2ccb9dc2c4c4d8e13b37249879e53748571dd3d1b24816bd338369824869a083d20d
-
SSDEEP
98304:KvmGccy/z7hh0+JcCfZj7l4+bCJAenKKLunqGTJ2x8lFBe24xvl:0mhxC+eCfdRbCBnKHPJwI4vl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 195fa1e3d9a33dcc265dc16147d4922a982de029df3cb7c661b6e440064901f5
Files
-
195fa1e3d9a33dcc265dc16147d4922a982de029df3cb7c661b6e440064901f5.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ