Static task
static1
Behavioral task
behavioral1
Sample
4d9e0ad883a3dd932b80e9b157b5a7d46cb38d865ea34eaf16e303e90ddcb43c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d9e0ad883a3dd932b80e9b157b5a7d46cb38d865ea34eaf16e303e90ddcb43c.exe
Resource
win10v2004-20240802-en
General
-
Target
4d9e0ad883a3dd932b80e9b157b5a7d46cb38d865ea34eaf16e303e90ddcb43c
-
Size
64KB
-
MD5
933d21870ffa8797a634e46d39868c89
-
SHA1
2977d34ad05ca9be76032730149eb0fcc571bf34
-
SHA256
4d9e0ad883a3dd932b80e9b157b5a7d46cb38d865ea34eaf16e303e90ddcb43c
-
SHA512
b232544fd2e032ebccf285bf44c5f1baf5ea638d4889e3777ca0880b0cd192a56f76a43244ff6bf276d5602be9c84c09edd2aaf7d2fde6ddcd9f64b8f8aae8b0
-
SSDEEP
768:g1DQedPlNqMH7f4NEa4ByhzMR4+FUb9aVTx+iixqMqf/1H5zXdnhKJDrY83kohmy:Cce7H7c4BSI5FUb9apx3vl3YE8Rm0Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d9e0ad883a3dd932b80e9b157b5a7d46cb38d865ea34eaf16e303e90ddcb43c
Files
-
4d9e0ad883a3dd932b80e9b157b5a7d46cb38d865ea34eaf16e303e90ddcb43c.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jfbbql Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ