Static task
static1
Behavioral task
behavioral1
Sample
18fb767ffc6676e255737eb0889a1d6547f2aad72f475ee74699372641e5b9fd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18fb767ffc6676e255737eb0889a1d6547f2aad72f475ee74699372641e5b9fd.exe
Resource
win10v2004-20240508-en
General
-
Target
18fb767ffc6676e255737eb0889a1d6547f2aad72f475ee74699372641e5b9fd
-
Size
676KB
-
MD5
168aafde5a5535ec687778101c8268d4
-
SHA1
70287ae872926e0ce63008877d81893593cd9071
-
SHA256
18fb767ffc6676e255737eb0889a1d6547f2aad72f475ee74699372641e5b9fd
-
SHA512
09fd7a77c4ef9a0ef106c5c8832af55248f9be325a1936633875ceddf9325c65c54a211e940322824c906b646c46d74e5b556df5617686424a722bcc997e6b35
-
SSDEEP
12288:j0v385U+Oh+KMnkRnTTLzKinjZ5XiUYLW5Ar01i+Up8oaFTH:j0v3IdOh+KMMf39OLW5ArUi+xoO
Malware Config
Signatures
-
Detects executables packed with Enigma 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Enigma -
Detects packed executables observed in Molerats 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Loader -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18fb767ffc6676e255737eb0889a1d6547f2aad72f475ee74699372641e5b9fd
Files
-
18fb767ffc6676e255737eb0889a1d6547f2aad72f475ee74699372641e5b9fd.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma1 Size: 124KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: 284KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE