Static task
static1
Behavioral task
behavioral1
Sample
8e0a2d6e1e317b6182b3e960f4f95af895aa3e9652ddfcdbfd1c702222ab8929.exe
Resource
win7-20240221-en
General
-
Target
8e0a2d6e1e317b6182b3e960f4f95af895aa3e9652ddfcdbfd1c702222ab8929
-
Size
100KB
-
MD5
20e1e3c6a39753cc4bdfca34d2292f06
-
SHA1
35554f107b1942252c4ac08268fee869033b2767
-
SHA256
8e0a2d6e1e317b6182b3e960f4f95af895aa3e9652ddfcdbfd1c702222ab8929
-
SHA512
c5e1b7684a2304b19bfb880383362650aac3b483e4e9159d9f79e48c10fc39fb494f8326006af1fd141cea3d4462c11eb41cac8a4ab4a63a4aa38b849cfbcb67
-
SSDEEP
3072:ECpR8RzUz5++9/EvTUKsQV62e5q+WfkC:ECpR8RzUFzUTUKnV6p5q+k
Malware Config
Signatures
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 1 IoCs
Processes:
resource yara_rule sample INDICATOR_EXE_Packed_SimplePolyEngine -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8e0a2d6e1e317b6182b3e960f4f95af895aa3e9652ddfcdbfd1c702222ab8929
Files
-
8e0a2d6e1e317b6182b3e960f4f95af895aa3e9652ddfcdbfd1c702222ab8929.exe windows:4 windows x86 arch:x86
14610dd0ebbc796a9a3a2ba2cdd24e79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
user32
MessageBoxW
Sections
.text Size: 68KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE