Static task
static1
Behavioral task
behavioral1
Sample
8e71e6df4a3f4bb07ae5256142f3c3b30d9d7a9085df7a198727fb3e352da3b5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
8e71e6df4a3f4bb07ae5256142f3c3b30d9d7a9085df7a198727fb3e352da3b5.exe
Resource
win11-20240426-en
General
-
Target
8e71e6df4a3f4bb07ae5256142f3c3b30d9d7a9085df7a198727fb3e352da3b5
-
Size
4.9MB
-
MD5
e32aa1f157fa7a6539a6ab7f43512f5b
-
SHA1
ea3cd56816c2756a6ecd1fa91b16e4e5ae5fb74e
-
SHA256
8e71e6df4a3f4bb07ae5256142f3c3b30d9d7a9085df7a198727fb3e352da3b5
-
SHA512
13a3587c3ff43a524bbf5c47f63ce5556fda2b869ebddff68c6e9845e9e4a41418c63775b7f23a6c76e88bb12d1d52ed83f9301064ae63743e05ae9811a2a551
-
SSDEEP
98304:mX8Sa9rAiNKaFe0UVS6zGrdeeuqS+yP88XwkbsS5dmGQsVx:uJ0bSpVS6zAdeeud188gkB76sVx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e71e6df4a3f4bb07ae5256142f3c3b30d9d7a9085df7a198727fb3e352da3b5
Files
-
8e71e6df4a3f4bb07ae5256142f3c3b30d9d7a9085df7a198727fb3e352da3b5.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ