Static task
static1
Behavioral task
behavioral1
Sample
c40bd2e0ceb5e508f650f503eebe5fc9ca094d90102ce604ba6b3e0a19ef068c.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c40bd2e0ceb5e508f650f503eebe5fc9ca094d90102ce604ba6b3e0a19ef068c.exe
Resource
win10v2004-20240709-en
General
-
Target
c40bd2e0ceb5e508f650f503eebe5fc9ca094d90102ce604ba6b3e0a19ef068c
-
Size
64KB
-
MD5
521a09faa78164ff9edac0a65f32f500
-
SHA1
1f66937d40c5ea649bb887711534374abbfba829
-
SHA256
c40bd2e0ceb5e508f650f503eebe5fc9ca094d90102ce604ba6b3e0a19ef068c
-
SHA512
ec66e694740f80d1abac8c6141cd94b18a4e0af09f9f596b17d2d2f39e48cdbef1a2bf241b33b6685d6962433707fd9ddfc450bbbf39b2456f5a19f92786545e
-
SSDEEP
768:nuOR5OTa55M5FA2c6aWPjqfVi0oZqjZl552AZib+L52p/1H5nnXdnh1AuxYbIREP:nNR5CkYkWPjqBok55NL52LrXdZgQe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c40bd2e0ceb5e508f650f503eebe5fc9ca094d90102ce604ba6b3e0a19ef068c
Files
-
c40bd2e0ceb5e508f650f503eebe5fc9ca094d90102ce604ba6b3e0a19ef068c.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kofbl Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ