Static task
static1
Behavioral task
behavioral1
Sample
bf75914be9c1cf64459643fd4fcc62e1d357a2dec5a6c2a80630f6fbac875772.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bf75914be9c1cf64459643fd4fcc62e1d357a2dec5a6c2a80630f6fbac875772.exe
Resource
win10v2004-20240426-en
General
-
Target
bf75914be9c1cf64459643fd4fcc62e1d357a2dec5a6c2a80630f6fbac875772
-
Size
64KB
-
MD5
1e2c54c48b7556efbe3b70980767e80c
-
SHA1
147af1f8588ca30c3a1831daa899bdcbf1be7eb7
-
SHA256
bf75914be9c1cf64459643fd4fcc62e1d357a2dec5a6c2a80630f6fbac875772
-
SHA512
5d8f6b0d937b894e457b631399bc311d5724fa5db59d35761783bde69dabc7ea154aea89c18db86bdeb572824992cb6b656ae33ad9603dfa5f3de25739ae872a
-
SSDEEP
768:gnVytn5az9IHr+1KgpTsT21lGVlEVLgp3uQ3us2+XSKVuMEnyKBljouc/1H58+Xq:OVy96E+1HGpn3GKVtvKBpodW8zDfWqc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf75914be9c1cf64459643fd4fcc62e1d357a2dec5a6c2a80630f6fbac875772
Files
-
bf75914be9c1cf64459643fd4fcc62e1d357a2dec5a6c2a80630f6fbac875772.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ