Static task
static1
Behavioral task
behavioral1
Sample
9cc6384bdfabcd9b318acae7dc0b8f023d280c134a9eceda6b7dd0b96d6dd731.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9cc6384bdfabcd9b318acae7dc0b8f023d280c134a9eceda6b7dd0b96d6dd731.exe
Resource
win10v2004-20240802-en
General
-
Target
411ef0c3e4b7d338684e5698ae1909da.zip
-
Size
14.6MB
-
MD5
7e08a53d27a1b534ec370c61980a2910
-
SHA1
b90350097bad5811f7d975d83c738ab060f8085f
-
SHA256
deb62291cc18445853551ed16baabde6df2cb201dba57ba8712e941fbf77c15a
-
SHA512
72941303db75bffb6debaa42861b85be8c161cea9313d1a6de2cdf36421e42187b05fd5042331df2644a98b443bb23297e618d96214f8578249a5545b33e3e28
-
SSDEEP
196608:ToqNC7ywPDLEyby98JLNm3tfyZQ+V6TGUlVhzRkawYO245g8U+EoHlomcDGeZeG6:ToqsbPxq8JLosqVq6lOWZ+E0rcDpAFcM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9cc6384bdfabcd9b318acae7dc0b8f023d280c134a9eceda6b7dd0b96d6dd731
Files
-
411ef0c3e4b7d338684e5698ae1909da.zip.zip
Password: infected
-
9cc6384bdfabcd9b318acae7dc0b8f023d280c134a9eceda6b7dd0b96d6dd731.exe windows:4 windows x86 arch:x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 315KB - Virtual size: 315KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ