Static task
static1
Behavioral task
behavioral1
Sample
3b5197779053e3a9d0351b0db71847154db7380b609e55afb819527fd92fa02d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3b5197779053e3a9d0351b0db71847154db7380b609e55afb819527fd92fa02d.exe
Resource
win10v2004-20240508-en
General
-
Target
3b5197779053e3a9d0351b0db71847154db7380b609e55afb819527fd92fa02d
-
Size
1.2MB
-
MD5
4d62e3247712d92d31bc55f1be28deb5
-
SHA1
0703593e702e0a546b790e9c12315d5256e83779
-
SHA256
3b5197779053e3a9d0351b0db71847154db7380b609e55afb819527fd92fa02d
-
SHA512
8d49ec3bfbfa72eadfacd663c3df82bbaac8dfd98852e533986daaf3ac957829c5562c0fe4214d5db20cc1701e7c958f45db99a52789b3fd902e802518558343
-
SSDEEP
12288:lsn2/+Xq1gYgR+8DAoczI2ZfnwlQTePINayz+ByIne7xmmZjIUTSl+0/1:02AMdIuwe3zfIe7xmvH/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b5197779053e3a9d0351b0db71847154db7380b609e55afb819527fd92fa02d
Files
-
3b5197779053e3a9d0351b0db71847154db7380b609e55afb819527fd92fa02d.exe windows:4 windows x64 arch:x64
0b94063787d36a7c31264e2d280d4c4b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
PDB Paths
Imports
msys-ncursesw6
_nc_curr_col
_nc_curr_line
_nc_doalloc
_nc_find_entry
_nc_find_user_entry
_nc_first_name
_nc_get_hash_table
_nc_head
_nc_home_terminfo
_nc_name_match
_nc_pathlast
_nc_reset_tparm
_nc_rootname
_nc_set_source
_nc_set_type
_nc_tail
_nc_tic_dir
_nc_tinfo_fkeys
_nc_tiparm
_nc_tparm_analyze
_nc_tparm_err
_nc_tracing
_nc_trim_sgr0
_nc_user_definable
_nc_visbuf
_nc_visbuf2
_nc_warning
boolcodes
boolfnames
boolnames
curses_version
keyname
numcodes
numfnames
numnames
strcodes
strfnames
strnames
tgoto
tigetflag
tigetstr
tparm
use_extended_names
msys-ticw6
_nc_capcmp
_nc_check_termtype2
_nc_disable_period
_nc_infotocap
_nc_read_entry_source
_nc_resolve_uses2
_nc_set_writedir
_nc_strict_bsd
_nc_syntax
_nc_tic_expand
_nc_tic_written
_nc_write_entry
_nc_write_object
msys-2.0
__cxa_atexit
__errno
__getreent
__locale_ctype_ptr
__main
_dll_crt0
_impure_ptr
access
atoi
calloc
cygwin_internal
dll_dllcrt0
exit
fclose
fdopen
fflush
fgetc
fgets
fopen
fprintf
fputc
fputs
free
fseek
fwrite
getenv
getopt
malloc
memcmp
memcpy
mkstemp
msys_detach_dll
optarg
optind
perror
posix_memalign
printf
putchar
puts
realloc
remove
rewind
sprintf
sscanf
stat
stpcpy
strchr
strcmp
strcpy
strdup
strerror
strlen
strncmp
strncpy
strstr
strtol
tolower
umask
kernel32
GetModuleHandleA
GetModuleHandleW
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 512B - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 932B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 704B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE