F:\Office\Target\x86\ship\postc2r\x-none\msoxmled.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cf2e8d9543b44a2957c1489c16cbc1105da0e9f34b6ee3604cdb83f6041774e1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf2e8d9543b44a2957c1489c16cbc1105da0e9f34b6ee3604cdb83f6041774e1.exe
Resource
win10v2004-20240802-en
General
-
Target
300d28a221e499e04ed86b4757aa6be9.zip
-
Size
875KB
-
MD5
80c43566755a46598f65e57028bfc6a0
-
SHA1
b4b329170897fb16ff6690bb3e0c41a07a19d246
-
SHA256
d8bd0e018fed47c0f3ad539fc8375b8f20353b7dcf14ed7f15e190590754bcc8
-
SHA512
d6638c732f3574a5196b733a1891fd8d107c7ae8b991f8d7d83142f4e569c8eb8c25ca2366cfeb203812ccdde826e1e6f708faace719680ea968e0c36ecc4618
-
SSDEEP
24576:t23v2FZKPjE/RyjdkSyx3HQN8vUIyf9jV080OLGH:g/nA/ode3TvU79jV76
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/cf2e8d9543b44a2957c1489c16cbc1105da0e9f34b6ee3604cdb83f6041774e1
Files
-
300d28a221e499e04ed86b4757aa6be9.zip.zip
Password: infected
-
cf2e8d9543b44a2957c1489c16cbc1105da0e9f34b6ee3604cdb83f6041774e1.exe windows:6 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c2r Size: 512B - Virtual size: 280B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ