Static task
static1
Behavioral task
behavioral1
Sample
4a4d3eb67da40094714346116f3e9176b3ff44a1f1e01a479b44376852f31301.exe
Resource
win7-20240508-en
General
-
Target
4a4d3eb67da40094714346116f3e9176b3ff44a1f1e01a479b44376852f31301
-
Size
100KB
-
MD5
f06b90e8439d3b3b94467e080b9970e0
-
SHA1
67c03284e74196aeffe5b11713c54d0f3bf0a3f9
-
SHA256
4a4d3eb67da40094714346116f3e9176b3ff44a1f1e01a479b44376852f31301
-
SHA512
d471503e3f22efa4cb4dadb9c687ed93672b7a6d05d82d2d636178b2b7ab4400d92f7d1c00185007c600b2f0e74f9933daa17aecbe1314dc5e2bb0c50b7251ad
-
SSDEEP
1536:RapRq3H+u/4VxtpYS2zwyydjUoKpe/weACIg:RaXq+s4VBYRzIjUpedtn
Malware Config
Signatures
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 1 IoCs
Processes:
resource yara_rule sample INDICATOR_EXE_Packed_SimplePolyEngine -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4a4d3eb67da40094714346116f3e9176b3ff44a1f1e01a479b44376852f31301
Files
-
4a4d3eb67da40094714346116f3e9176b3ff44a1f1e01a479b44376852f31301.exe windows:4 windows x86 arch:x86
14610dd0ebbc796a9a3a2ba2cdd24e79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
user32
MessageBoxW
Sections
.text Size: 76KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE