Behavioral task
behavioral1
Sample
2524-20-0x0000000001E10000-0x0000000001E4A000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2524-20-0x0000000001E10000-0x0000000001E4A000-memory.exe
Resource
win10v2004-20240709-en
General
-
Target
2524-20-0x0000000001E10000-0x0000000001E4A000-memory.dmp
-
Size
232KB
-
MD5
a86840e0357a662a395c4352c2f2b370
-
SHA1
1f5846a25f2be8597d7a3e1e867a95975fb1c71f
-
SHA256
520b3772ae322ac7df03250f80005afe8578e4ed137a640fc019fd6486bb1c52
-
SHA512
f7e96014b6a244c2d619179d7cde74aaa57666406a6611bc9562643a1d86c1b96af8922cd4c77eca2218a7163219ecf5b23cafad009f7b43f3ef98615cf52727
-
SSDEEP
6144:HFajky5Ycn5AExcxu+5u9qYgT0WY4E7scBjqB:sL5yF50qYgTPrE7s0eB
Malware Config
Signatures
-
Trickbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2524-20-0x0000000001E10000-0x0000000001E4A000-memory.dmp
Files
-
2524-20-0x0000000001E10000-0x0000000001E4A000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 228KB - Virtual size: 30.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE