Static task
static1
Behavioral task
behavioral1
Sample
f2b78690d8d4d9b379e7f117ff687608541d0dfd403d9f622502024edd846268.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f2b78690d8d4d9b379e7f117ff687608541d0dfd403d9f622502024edd846268.exe
Resource
win10v2004-20240709-en
General
-
Target
f2b78690d8d4d9b379e7f117ff687608541d0dfd403d9f622502024edd846268
-
Size
59KB
-
MD5
fafac7b4959ce74542c525adcf21b69c
-
SHA1
c103f119d298309cf844aafa91e3c1718dbaabf3
-
SHA256
f2b78690d8d4d9b379e7f117ff687608541d0dfd403d9f622502024edd846268
-
SHA512
42fdf8959ea4846cf451816c2a51f389ce1c75589642c12883195519515a30c573721d8fc16303d9891c850e96acdf766a3f737960995d89d53029dbae3e35f6
-
SSDEEP
768:8RG5cr8NDa8OF3P/crAxtl4QqnfiBNVEQ6IP31st6W+YLvn8P/FG+cQnFQTUmVcB:8HYGH33Vl4FnfizHN3pPE+cwpm2vDjh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f2b78690d8d4d9b379e7f117ff687608541d0dfd403d9f622502024edd846268
Files
-
f2b78690d8d4d9b379e7f117ff687608541d0dfd403d9f622502024edd846268.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ