Static task
static1
Behavioral task
behavioral1
Sample
361a751abb2b318f55d3a733ee6c0d60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
361a751abb2b318f55d3a733ee6c0d60N.exe
Resource
win10v2004-20240709-en
General
-
Target
361a751abb2b318f55d3a733ee6c0d60N.exe
-
Size
621KB
-
MD5
361a751abb2b318f55d3a733ee6c0d60
-
SHA1
facea2121c58f633879c407c53c8c9924b3207fd
-
SHA256
4eac0e9adaff93e30805e42b37f25a980fe1fe7966c4edecd4dca79cbc9c4586
-
SHA512
30a8af40187cd433aa4cec68109759063c065413d8a277555cd78aff516b9e3d917b98391680d5cbc2855fa8ab88dfc520dc7172b08c1df2267af0817d00fa9c
-
SSDEEP
12288:A636tMTmkJR4Do07Y86gw5CtCjX+NLuFhNpBeZT3X:Z6OSkQ/7Gb8NLEbeZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 361a751abb2b318f55d3a733ee6c0d60N.exe
Files
-
361a751abb2b318f55d3a733ee6c0d60N.exe.exe windows:4 windows x64 arch:x64
dd874adf4faa7586fcf8de946d0545eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
PDB Paths
Imports
msys-ncursesw6
_nc_align_termtype
_nc_doalloc
_nc_err_abort
_nc_find_entry
_nc_first_db
_nc_first_name
_nc_get_hash_table
_nc_head
_nc_last_db
_nc_next_db
_nc_read_entry2
_nc_read_file_entry
_nc_rootname
_nc_set_source
_nc_tail
_nc_tracing
_nc_trim_sgr0
_nc_user_definable
_nc_warning
boolcodes
boolfnames
boolnames
curses_version
numcodes
numfnames
numnames
strcodes
strfnames
strnames
use_extended_names
msys-ticw6
_nc_capcmp
_nc_disable_period
_nc_entry_match
_nc_infotocap
_nc_read_entry_source
_nc_resolve_uses2
_nc_strict_bsd
_nc_tic_expand
_nc_write_object
msys-2.0
__cxa_atexit
__getreent
__locale_ctype_ptr
__main
_dll_crt0
_impure_ptr
atoi
calloc
cygwin_internal
dll_dllcrt0
exit
fprintf
fputc
fputs
free
freopen
fwrite
getenv
getopt
malloc
memcpy
msys_detach_dll
optarg
optind
perror
posix_memalign
printf
putchar
puts
realloc
sprintf
stpcpy
strcat
strchr
strcmp
strcpy
strlen
strncmp
strncpy
strspn
strtok
strtol
kernel32
GetModuleHandleA
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 512B - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 672B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE