Static task
static1
Behavioral task
behavioral1
Sample
4dac4178e559e5d765e64556ee4b8b69798c143294a182ee806a1e3f92298ca1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4dac4178e559e5d765e64556ee4b8b69798c143294a182ee806a1e3f92298ca1.exe
Resource
win10v2004-20240508-en
General
-
Target
4dac4178e559e5d765e64556ee4b8b69798c143294a182ee806a1e3f92298ca1
-
Size
134KB
-
MD5
493529d482d94c9f282dd9b59dcadd9a
-
SHA1
56a62d25251a6be4b60e801d5bdff101b7225d43
-
SHA256
4dac4178e559e5d765e64556ee4b8b69798c143294a182ee806a1e3f92298ca1
-
SHA512
7860eb8b90455886d985d76df553f70fa977d396078f6bcd4d03540e48cae7436877cb1bcaceafb7368432f0825396e434d5bcad9674edfc6ca9142d69285630
-
SSDEEP
3072:7wccBVb3dsXwdTb9Md/TE83a4RsoRE5k/WQQcccVs0:7wccH3dpb2ZsSmIZQrCs0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dac4178e559e5d765e64556ee4b8b69798c143294a182ee806a1e3f92298ca1
Files
-
4dac4178e559e5d765e64556ee4b8b69798c143294a182ee806a1e3f92298ca1.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 104KB - Virtual size: 104KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 12B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fubrej Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ