Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_780e5bb1aa7b0033634c9f14a5f0015c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
VirusShare_780e5bb1aa7b0033634c9f14a5f0015c.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_780e5bb1aa7b0033634c9f14a5f0015c
-
Size
472KB
-
MD5
780e5bb1aa7b0033634c9f14a5f0015c
-
SHA1
e1c24dc86ac63eb6d7c02e29d1b84767847c7819
-
SHA256
779f86b6a649060caa31e5be291b185b2fc0f62fcf74a9dbf1e2ef3bd376a4ff
-
SHA512
5de498bcd59c39b2eea91893228f17b156ea24d107e27e13c5b658338867bc07e27f78fabb8db5020050cf83f6a05daeac595b9cfebe5c790e78d30ac63282a2
-
SSDEEP
6144:CB8iFYYFywXwM1d0FkmFT1zTM6bDf0HFr3grgciKwQ7dkDRpMH4H6dd6:AF8w91d0FkmFTl1fCBIP6MH4HS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_780e5bb1aa7b0033634c9f14a5f0015c
Files
-
VirusShare_780e5bb1aa7b0033634c9f14a5f0015c.exe windows:4 windows x86 arch:x86
9f5da4a6a268fe883b6df2fe946b293d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommProperties
ConvertDefaultLocale
SetErrorMode
WTSGetActiveConsoleSessionId
GetModuleHandleA
VirtualProtect
UpdateResourceA
FreeConsole
GetLastError
ScrollConsoleScreenBufferA
GetConsoleWindow
GetConsoleScreenBufferInfo
GetStdHandle
VirtualQuery
SetFileApisToANSI
msvcrt
sprintf
printf
memcpy
iswupper
localeconv
user32
ShowWindow
FindWindowExA
clusapi
ClusterNodeControl
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 877B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 352KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ