Static task
static1
Behavioral task
behavioral1
Sample
5ff269a233e48a6e174ac25474d70e0bb059991e1afe914efe8b79ae92488e80.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
5ff269a233e48a6e174ac25474d70e0bb059991e1afe914efe8b79ae92488e80.exe
Resource
win11-20240508-en
General
-
Target
5ff269a233e48a6e174ac25474d70e0bb059991e1afe914efe8b79ae92488e80
-
Size
5.1MB
-
MD5
f327c83a85487dfa0ffd18b6c09d0316
-
SHA1
80bbbcf84f6ddca9f704f2c597b2366844cb4af4
-
SHA256
5ff269a233e48a6e174ac25474d70e0bb059991e1afe914efe8b79ae92488e80
-
SHA512
758123039f3f664c5422356edda77e1a63e0a08224b681e6da1a4e3f379cf271a193a2c10c2cfe65de28d822bfbafa23a674aac205b148148200f0682f53e8ac
-
SSDEEP
98304:mNcyl/Z82R5tjq4wmE7xhQl1MAKsFHuiFskii0f/Ai:ycylB82RO4wh7jQlxHupwC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5ff269a233e48a6e174ac25474d70e0bb059991e1afe914efe8b79ae92488e80
Files
-
5ff269a233e48a6e174ac25474d70e0bb059991e1afe914efe8b79ae92488e80.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ