Static task
static1
General
-
Target
LabyMod4.exe
-
Size
236KB
-
MD5
2d86fb4edd0ccd1f1a4ba8fe6dfb9bf6
-
SHA1
731eddb56e2a6f9e1057dc4c764fc84dd504ffb8
-
SHA256
f2e897a8ecd708bd902adf8fb0f7dfc8d6917e1fc6f67214378ae9e27e7bce50
-
SHA512
8fd545b6bae1f78b3a7d891acdfae3ab479ac6164933984151044bb854b7d798356bf743caea273acae586fa02ff29004da6b4e672ed8741319ce436b212a28c
-
SSDEEP
3072:+0mlHG8ZOe7vNIbUt4jTsLtwrSUOmfpjTxFyfUdttDJ/RSqwJQ6oX:+0mlHHoENJtl5YbfpTA05ZwJK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource LabyMod4.exe
Files
-
LabyMod4.exe.exe windows:4 windows x86 arch:x86
d5d9d937853db8b666bd4b525813d7bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindFileNameA
kernel32
LockResource
lstrlenA
CloseHandle
CreateFileA
ExitProcess
FindResourceA
FreeResource
GetCommandLineA
GetEnvironmentVariableA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
HeapAlloc
HeapFree
LoadLibraryA
LoadResource
lstrcpynA
RtlMoveMemory
SetFileAttributesA
SizeofResource
WriteFile
lstrcatA
lstrcpyA
user32
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetMessageA
LoadCursorA
LoadIconA
MessageBoxA
PostQuitMessage
RegisterClassExA
SendMessageA
ShowWindow
TranslateMessage
UpdateWindow
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE