Static task
static1
Behavioral task
behavioral1
Sample
2726d1bd43051a27c495272580dc0b6faebf9107946dc1ea1b257ceeb160f080.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2726d1bd43051a27c495272580dc0b6faebf9107946dc1ea1b257ceeb160f080.exe
Resource
win10v2004-20240508-en
General
-
Target
2726d1bd43051a27c495272580dc0b6faebf9107946dc1ea1b257ceeb160f080
-
Size
268KB
-
MD5
4a87dbe8f3907b8ce362df6ed82f6d7a
-
SHA1
8e4b4e4ca14d6445220ab53c4deecc0bfc0a42f5
-
SHA256
2726d1bd43051a27c495272580dc0b6faebf9107946dc1ea1b257ceeb160f080
-
SHA512
41d82caa18ab1f4c7bce476e400485dd91fa283e81e9307f42ddb0c1dfefa43fda403c123dcceb7fdd82c2b80f1e00014f8ee732eb0d79e0323db60333757cf3
-
SSDEEP
6144:jTC2gu5fhx3rEfMKjK9pIfxPyTOIYMis0BkdGsUbZoi5idQCibML:XV7r7KG9pMyBGBkLCoi5idQCibML
Malware Config
Signatures
-
Detects executables packed with ConfuserEx Mod 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_ConfuserEx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2726d1bd43051a27c495272580dc0b6faebf9107946dc1ea1b257ceeb160f080
Files
-
2726d1bd43051a27c495272580dc0b6faebf9107946dc1ea1b257ceeb160f080.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
K2NgX~! Size: 213KB - Virtual size: 213KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ