Static task
static1
Behavioral task
behavioral1
Sample
dab9a84f752c602dabf90e43234fad1f6c97a6c64c8e482c35c9e5af60185aef.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
dab9a84f752c602dabf90e43234fad1f6c97a6c64c8e482c35c9e5af60185aef.exe
Resource
win10v2004-20240802-en
General
-
Target
7cc2effbe8d36956c8dd4c227950ff4e.zip
-
Size
277KB
-
MD5
70f8239e3fdd7ac6304e31a10bb8105f
-
SHA1
c9452568936397f3385bfd9157d92b2701bd3948
-
SHA256
505354123a633875fb08866976b45cd54b6c1571e1e9e6f1b687045225b147f5
-
SHA512
2f25ed5af031cbc69093c0f4f0a0cea09a065b8aec6560c627b38069ed7184a20ecc8c494fe2dfad60c82a1f75b5277bfc397f944f927219de144622285615f9
-
SSDEEP
6144:M600M8XAQwcXnIo03HLSgMum3dT/Q2BHpx/+FZ/7XL5G:MT8XAcsLSgLmNTXBHp1aZjg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/dab9a84f752c602dabf90e43234fad1f6c97a6c64c8e482c35c9e5af60185aef
Files
-
7cc2effbe8d36956c8dd4c227950ff4e.zip.zip
Password: infected
-
dab9a84f752c602dabf90e43234fad1f6c97a6c64c8e482c35c9e5af60185aef.exe windows:4 windows x86 arch:x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 429KB - Virtual size: 428KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 18.1MB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ