Static task
static1
Behavioral task
behavioral1
Sample
a81600162702b7e6171486a233a9190250049e7f90fe8bf5536d57434dd86225.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a81600162702b7e6171486a233a9190250049e7f90fe8bf5536d57434dd86225.exe
Resource
win10v2004-20240802-en
General
-
Target
a81600162702b7e6171486a233a9190250049e7f90fe8bf5536d57434dd86225
-
Size
59KB
-
MD5
0a329aa9ea5318713e97ddbe2eb75d2d
-
SHA1
7e02b935c570c56b2d69c1c2fae5247c70ef5058
-
SHA256
a81600162702b7e6171486a233a9190250049e7f90fe8bf5536d57434dd86225
-
SHA512
177e8fbd6a1663cd0c2fbcd7a79c60f089c8e0597fa2b3a357466adce5715cb5337a162eaa2817ebbd0008327ffae775e0343cdaac3cb30c03e1aac1bf1fbbc1
-
SSDEEP
768:8jnFhnhiIWWtj23iBkOaG+7HnmPfPQ56E+lgBuv2rz4PS5tbUR3Y2/1H5HXdnhg2:+nFhn8IWEi3iJybSf45N40hy3YsPh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a81600162702b7e6171486a233a9190250049e7f90fe8bf5536d57434dd86225
Files
-
a81600162702b7e6171486a233a9190250049e7f90fe8bf5536d57434dd86225.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ