Static task
static1
Behavioral task
behavioral1
Sample
b7bf72fbd58a4b050df6cb7005e09f80493142dde4364848a1a3b5b01dd8e6a9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b7bf72fbd58a4b050df6cb7005e09f80493142dde4364848a1a3b5b01dd8e6a9.exe
Resource
win10v2004-20240508-en
General
-
Target
b7bf72fbd58a4b050df6cb7005e09f80493142dde4364848a1a3b5b01dd8e6a9
-
Size
57KB
-
MD5
5b3c79b3bb9a6b09d3b24721cc226d68
-
SHA1
da506b71e935f4ddeac56895ef5f6c8d9d277625
-
SHA256
b7bf72fbd58a4b050df6cb7005e09f80493142dde4364848a1a3b5b01dd8e6a9
-
SHA512
ab81ef4c081b8e614549eb724b7f00e455905bd35411fe48aab3f5d4b77b5994f8abacc65a8c4c024b00ea4ef82dfbb8329399e51cd049d8988cb179259cc9c1
-
SSDEEP
768:/F4a5fqdaCCsxeY1FH11Q6GHyGzpeC18MD6p5Twvka2lHM5P/OU2xz0S/1H50Xdq:/F4asdaCCCcjH7ACgzEvka2OWU290QY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7bf72fbd58a4b050df6cb7005e09f80493142dde4364848a1a3b5b01dd8e6a9
Files
-
b7bf72fbd58a4b050df6cb7005e09f80493142dde4364848a1a3b5b01dd8e6a9.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ