Static task
static1
Behavioral task
behavioral1
Sample
d5e1d19dade7c825ff8b2309030dab6e4a16a0aacc4c0fbd1a102853f1ed5012.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
d5e1d19dade7c825ff8b2309030dab6e4a16a0aacc4c0fbd1a102853f1ed5012.exe
Resource
win10v2004-20240611-en
General
-
Target
d5e1d19dade7c825ff8b2309030dab6e4a16a0aacc4c0fbd1a102853f1ed5012
-
Size
304KB
-
MD5
8b15d6c57c9db7a1df2076f6952041cf
-
SHA1
f1a90d3cf5641feb5c5da35294bcecde010e5c17
-
SHA256
d5e1d19dade7c825ff8b2309030dab6e4a16a0aacc4c0fbd1a102853f1ed5012
-
SHA512
ccfc9a8bc1b0f88207f76af99ea31ffddee1faccf9fabaf20fb6784b9e1a1f90c63859d9ff1dfe451073bed9c0da23effde7352930b8627c186648429999eb85
-
SSDEEP
6144:dXC4vgmhbIxs3NBR7FptY4U2I43slItttFrOlNUa6J7AgO99lx4:dXCNi9BXjjsK68a6J7xO9V4
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5e1d19dade7c825ff8b2309030dab6e4a16a0aacc4c0fbd1a102853f1ed5012
Files
-
d5e1d19dade7c825ff8b2309030dab6e4a16a0aacc4c0fbd1a102853f1ed5012.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE