tnod32 eset h.pdb
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_331767c8a95117a9e51cc47c95afd3a9.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
VirusShare_331767c8a95117a9e51cc47c95afd3a9.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_331767c8a95117a9e51cc47c95afd3a9
-
Size
332KB
-
MD5
331767c8a95117a9e51cc47c95afd3a9
-
SHA1
7426d13db7f5c0d5ec7c6eca79279c11fd47def9
-
SHA256
ceb220b71dabfe1c875dd8a0620226c05dd45adef7e3812c11cd3759d7058070
-
SHA512
f40dd430b450e8bfe5be7a1d1468330b81ec972d3946c3161e3f22acb5302754889237c8611ab18790ba8e9bcd493aec7fac1a6f18bcadd77d1a64868a5344cf
-
SSDEEP
6144:iiNEzZL9+eE5WAH4nt5ssWK2NTZ5wV/sRVLtuO/Y5UCyf1KyN8z8+Tl:ZEzZh+eE5WASO7fOV/gN/SyNKyNmBJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_331767c8a95117a9e51cc47c95afd3a9
Files
-
VirusShare_331767c8a95117a9e51cc47c95afd3a9.exe windows:4 windows x86 arch:x86
32afcc08ecb31ec04c397032cc5cadd3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DefDlgProcA
CallWindowProcW
kernel32
lstrlenA
GetLogicalDriveStringsW
FormatMessageA
EnumCalendarInfoExW
CreateProcessW
VirtualQuery
IsProcessorFeaturePresent
lstrlenW
EnumResourceLanguagesW
FindCloseChangeNotification
Sections
.text Size: 304KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
btdx Size: 4KB - Virtual size: 366B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
alibaba Size: 4KB - Virtual size: 38B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1014B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ