Static task
static1
Behavioral task
behavioral1
Sample
313ca52d52cd3a6e33e869a853367fdcc51ca109b3baf3627d04bc64883eec7d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
313ca52d52cd3a6e33e869a853367fdcc51ca109b3baf3627d04bc64883eec7d.exe
Resource
win10v2004-20240508-en
General
-
Target
313ca52d52cd3a6e33e869a853367fdcc51ca109b3baf3627d04bc64883eec7d
-
Size
4.7MB
-
MD5
37c987edb4f86ea788a709a1d4cd1ea9
-
SHA1
25f8bc27683e33f3eafed007577d80d3c702dbf5
-
SHA256
313ca52d52cd3a6e33e869a853367fdcc51ca109b3baf3627d04bc64883eec7d
-
SHA512
c69f84bb8e7c7368ed9903ca04c04488f9f01b80e36016b0b826304a63e3f0cfa415e1d522d16a8e8e6552e241141fc7679e16a6b28ea63b4a22eb23d32c8c66
-
SSDEEP
98304:5rEp0HeiM3ic9z+KPiYGN91DwAfWBMazTNQUifExV4ci5l0ZYmbZpj7OET:5DHeXh9z+KqYAXXfWqazhD5xVDi5yZYw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 313ca52d52cd3a6e33e869a853367fdcc51ca109b3baf3627d04bc64883eec7d
Files
-
313ca52d52cd3a6e33e869a853367fdcc51ca109b3baf3627d04bc64883eec7d.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 344KB - Virtual size: 677KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 28KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 28KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.winlice Size: - Virtual size: 6.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ