Static task
static1
Behavioral task
behavioral1
Sample
c2b472136c9516d503ae833a69f44556721aeb2c871596e083e458557ef0a744.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c2b472136c9516d503ae833a69f44556721aeb2c871596e083e458557ef0a744.exe
Resource
win10v2004-20240802-en
General
-
Target
c2b472136c9516d503ae833a69f44556721aeb2c871596e083e458557ef0a744
-
Size
979KB
-
MD5
fcbe0c34ad53876f8f8aaad745faf48f
-
SHA1
16943069c073d58f80c2780a990116db34d3fa2e
-
SHA256
c2b472136c9516d503ae833a69f44556721aeb2c871596e083e458557ef0a744
-
SHA512
aad800d3e386d9e129d70ea69f0f721a122bd0a41f67e52032b48c87b6819749561863ce81ce83b00d81b8761787fdb2aee4aebe7db6862fb4922e042b96332e
-
SSDEEP
24576:TMDJWPudmrvZjBH41eljdyfjTC8u9xKqwmKJU:QtWnZjyeCGxWm2U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2b472136c9516d503ae833a69f44556721aeb2c871596e083e458557ef0a744
Files
-
c2b472136c9516d503ae833a69f44556721aeb2c871596e083e458557ef0a744.exe .ps1 windows:4 windows x86 arch:x86 polyglot
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 81KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 16KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 365KB - Virtual size: 544KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 503KB - Virtual size: 504KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE