Static task
static1
Behavioral task
behavioral1
Sample
b5e3286ff8b542e92c3828491b161377c07eb3a66268b4b045ea98f0efb7bbb5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5e3286ff8b542e92c3828491b161377c07eb3a66268b4b045ea98f0efb7bbb5.exe
Resource
win10v2004-20240508-en
General
-
Target
b5e3286ff8b542e92c3828491b161377c07eb3a66268b4b045ea98f0efb7bbb5
-
Size
6.2MB
-
MD5
9d53c6f01504f62a02c42a64c361daaa
-
SHA1
1a212c9bf38479d0be36f7582eb974af10fd2727
-
SHA256
b5e3286ff8b542e92c3828491b161377c07eb3a66268b4b045ea98f0efb7bbb5
-
SHA512
2b7e4a43140da8cb24305c58efd5bace35a788a7b1c372b3fc59a7628b8765f88f707ed9ee1c86e48dd67777c345189a0eb1011183a6846dd09b2be3d308306d
-
SSDEEP
98304:l1zv3Rapi5auD6wAli9Ygvif62rEGxar0nlZO80Jw0+3UVNau4N9HwZ4IHIZhCBv:rBa3u+wMs6PrE2ar0Lm9Tau4LWbHee0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5e3286ff8b542e92c3828491b161377c07eb3a66268b4b045ea98f0efb7bbb5
Files
-
b5e3286ff8b542e92c3828491b161377c07eb3a66268b4b045ea98f0efb7bbb5.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.winlice Size: - Virtual size: 6.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ