agamamouloveloveloveblowjobagamamoublow
Static task
static1
Behavioral task
behavioral1
Sample
115ea8abc87fb892763726dc7efe88c73fb1fa7c2651599ee4060c4f5e016ab8.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
115ea8abc87fb892763726dc7efe88c73fb1fa7c2651599ee4060c4f5e016ab8.dll
Resource
win10v2004-20240802-en
General
-
Target
432466a6779c13a3036bb24b0fe3bf43.zip
-
Size
935KB
-
MD5
4e0a21df9c8c836eb9ff051ad418e6c3
-
SHA1
d159a6ed4f237a7598aeb7da9819669efd49a794
-
SHA256
779ff802f00ee159155eaa06a12ae9f5ca5ab866b74d7ddc80fff2588f1122c6
-
SHA512
f8ce9303abd1ac2902abf159df4d39443200eed5c091a834d444c5c4d175b7826f90e2848e456794eb109e5790121504d43bd3a63cbbfdb3b5db649f74e8b3bb
-
SSDEEP
12288:vCUk5Mv1aC6WE4MoG4h8nxpxPY0p8vInj60XeW3C3jdxx2xar7qjAGzg8PyH05uQ:v45sIEbGptA3qAjp2gvnGg8h5uluJ7L7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/115ea8abc87fb892763726dc7efe88c73fb1fa7c2651599ee4060c4f5e016ab8
Files
-
432466a6779c13a3036bb24b0fe3bf43.zip.zip
Password: infected
-
115ea8abc87fb892763726dc7efe88c73fb1fa7c2651599ee4060c4f5e016ab8.dll windows:4 windows x86 arch:x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Exports
Exports
Sections
CODE Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 7KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 103B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ