Static task
static1
Behavioral task
behavioral1
Sample
d169a8409da6d2cbf76e4b270cb7d9e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d169a8409da6d2cbf76e4b270cb7d9e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d169a8409da6d2cbf76e4b270cb7d9e0N.exe
-
Size
64KB
-
MD5
d169a8409da6d2cbf76e4b270cb7d9e0
-
SHA1
e68d70b3b90ee4e5b5ef335c438e6371e5479b62
-
SHA256
cc26d401bcc0fa4861f1908109d99765a350ba7e7a633fe02242fa41665ecac2
-
SHA512
7ea1d725dae88263e9afd8dc4df15783674d0d3affb5eabe785163b13ec88edcdfac1e5086236f7dc4671f4f40ef09ad30ed00f30157a5f92203a9904e536982
-
SSDEEP
1536:dPX6q6Fb/a9Ep8wdKne20Hdfh4gKUXruCHcpzt/Idn:dKZhy9jLne209pwpFwn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d169a8409da6d2cbf76e4b270cb7d9e0N.exe
Files
-
d169a8409da6d2cbf76e4b270cb7d9e0N.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.embm Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ