Static task
static1
Behavioral task
behavioral1
Sample
ecb61cc6ec49c200284014049654f30cc10a1cd24511a141cc2f855273631296.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ecb61cc6ec49c200284014049654f30cc10a1cd24511a141cc2f855273631296.exe
Resource
win10v2004-20240802-en
General
-
Target
ecb61cc6ec49c200284014049654f30cc10a1cd24511a141cc2f855273631296
-
Size
6.6MB
-
MD5
73bd132e1908d0723b9b3882d54827d1
-
SHA1
2c60ec3248b867350d0caf796a6c0114e637de12
-
SHA256
ecb61cc6ec49c200284014049654f30cc10a1cd24511a141cc2f855273631296
-
SHA512
c42e7450b6c0b2ab8722571517ec3d819fc83b9e16379bd1d8f46e590c6207ea11833bbc4d0fcc0c2182a5971fd8808eaffc29de27628e3fcfb224139ed2438d
-
SSDEEP
98304:jeY1KMH2gPzKi9IJ+UZF18VhmqPk7G2xgCqR42mKz04a2iSciSRNcm6YnWTiny81:CYAONKIVhmOk7GFJ42m2viXcmaenyws
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ecb61cc6ec49c200284014049654f30cc10a1cd24511a141cc2f855273631296
Files
-
ecb61cc6ec49c200284014049654f30cc10a1cd24511a141cc2f855273631296.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 288KB - Virtual size: 540KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 40KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 24KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.winlice Size: - Virtual size: 10.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 6.2MB - Virtual size: 6.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ