Static task
static1
Behavioral task
behavioral1
Sample
ef2cb684ff9c041709275328e01baa023523b4b90226cecdeec88e454a735084.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef2cb684ff9c041709275328e01baa023523b4b90226cecdeec88e454a735084.exe
Resource
win10v2004-20240802-en
General
-
Target
11c065323fe0211306fbe457bbb970f1.zip
-
Size
141KB
-
MD5
11cc7b85031809ebb4fd8eb9c00df1dd
-
SHA1
c0ac528e13a69869a937bdf51bcf32c0148c4e4f
-
SHA256
df15476dd3b78786d2d60694f36fdaa953e6bc028625e3d2ee4792db15ec6a5b
-
SHA512
981ffa25ea56a345514e6f94cb6f6c09f899f0dab4a2b7ea767b1018073680739f86ec91be434f6d88da4c560e22ba74d11fea7536d1201965baf58b7156f305
-
SSDEEP
3072:oOf028PCTPE/e4IbG2KRZ2MDprvopT6eK6xxzHBDdI5d7W85:oOc2DzE/e4pZCq9o0KRBDdClW85
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ef2cb684ff9c041709275328e01baa023523b4b90226cecdeec88e454a735084
Files
-
11c065323fe0211306fbe457bbb970f1.zip.zip
Password: infected
-
ef2cb684ff9c041709275328e01baa023523b4b90226cecdeec88e454a735084.exe windows:4 windows x86 arch:x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 12B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE