Static task
static1
Behavioral task
behavioral1
Sample
5635dc6dc57cd8fb4255e6bcfa195c60N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5635dc6dc57cd8fb4255e6bcfa195c60N.exe
Resource
win10v2004-20240802-en
General
-
Target
5635dc6dc57cd8fb4255e6bcfa195c60N.exe
-
Size
1.3MB
-
MD5
5635dc6dc57cd8fb4255e6bcfa195c60
-
SHA1
2fc48422c8b2970fc855c14c57f258159eab4a3c
-
SHA256
20b4274018e6ca8812a9ae69275b1e83ead0a7a84abf07683fe212f8ee016998
-
SHA512
657a6dbfef427fe5fa6f946f82731a864ff1d3ff47c3d95d4ef6002cf3add67e8675e53b5bba465d42d2d785b671471277787e8c2690953965440aca4afbdbfb
-
SSDEEP
12288:gsn2zOl9rJS48yMQS5+PNeSymLlWkARmmyk7OVNnorgKdqhg0Objj5KxoU:h26l99S4VMNj+ARHzQyrgRK95if
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5635dc6dc57cd8fb4255e6bcfa195c60N.exe
Files
-
5635dc6dc57cd8fb4255e6bcfa195c60N.exe.exe windows:4 windows x64 arch:x64
0b94063787d36a7c31264e2d280d4c4b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
PDB Paths
Imports
msys-ncursesw6
_nc_curr_col
_nc_curr_line
_nc_doalloc
_nc_find_entry
_nc_find_user_entry
_nc_first_name
_nc_get_hash_table
_nc_head
_nc_home_terminfo
_nc_name_match
_nc_pathlast
_nc_reset_tparm
_nc_rootname
_nc_set_source
_nc_set_type
_nc_tail
_nc_tic_dir
_nc_tinfo_fkeys
_nc_tiparm
_nc_tparm_analyze
_nc_tparm_err
_nc_tracing
_nc_trim_sgr0
_nc_user_definable
_nc_visbuf
_nc_visbuf2
_nc_warning
boolcodes
boolfnames
boolnames
curses_version
keyname
numcodes
numfnames
numnames
strcodes
strfnames
strnames
tgoto
tigetflag
tigetstr
tparm
use_extended_names
msys-ticw6
_nc_capcmp
_nc_check_termtype2
_nc_disable_period
_nc_infotocap
_nc_read_entry_source
_nc_resolve_uses2
_nc_set_writedir
_nc_strict_bsd
_nc_syntax
_nc_tic_expand
_nc_tic_written
_nc_write_entry
_nc_write_object
msys-2.0
__cxa_atexit
__errno
__getreent
__locale_ctype_ptr
__main
_dll_crt0
_impure_ptr
access
atoi
calloc
cygwin_internal
dll_dllcrt0
exit
fclose
fdopen
fflush
fgetc
fgets
fopen
fprintf
fputc
fputs
free
fseek
fwrite
getenv
getopt
malloc
memcmp
memcpy
mkstemp
msys_detach_dll
optarg
optind
perror
posix_memalign
printf
putchar
puts
realloc
remove
rewind
sprintf
sscanf
stat
stpcpy
strchr
strcmp
strcpy
strdup
strerror
strlen
strncmp
strncpy
strstr
strtol
tolower
umask
kernel32
GetModuleHandleA
GetModuleHandleW
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 512B - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 932B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 704B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE