Static task
static1
Behavioral task
behavioral1
Sample
f1495905092e6495ab765453625ae3d0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f1495905092e6495ab765453625ae3d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f1495905092e6495ab765453625ae3d0N.exe
-
Size
64KB
-
MD5
f1495905092e6495ab765453625ae3d0
-
SHA1
e3e818d906088cbab84721d15445ae555bc8600b
-
SHA256
8c0944ec3407bf7687692d602ac5ed8613aa5956df9b8328050fff58c0d77134
-
SHA512
f72d39ce0b1c0b35e610ebcc277e1ad5ecf918a8a3555c51add29034e49a40d0e9d9f516dae84262410a0beffdba70721d8c3a19af5a75e6c960c1c8426c20b8
-
SSDEEP
1536:3ymdis4QtEEI6/G97dcbN6i4hwUXruCHcpzt/Idn:imQs4Qt66q7dcbIi1pFwn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f1495905092e6495ab765453625ae3d0N.exe
Files
-
f1495905092e6495ab765453625ae3d0N.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.embm Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ