Static task
static1
Behavioral task
behavioral1
Sample
bbaada07b1e2af5ced0608f3c4eb9ced7e7af47b01d1e78a92894fdccd9135dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bbaada07b1e2af5ced0608f3c4eb9ced7e7af47b01d1e78a92894fdccd9135dd.exe
Resource
win10v2004-20240802-en
General
-
Target
bbaada07b1e2af5ced0608f3c4eb9ced7e7af47b01d1e78a92894fdccd9135dd
-
Size
10.8MB
-
MD5
90523ba2afd4a3ce92f514eb4c610bec
-
SHA1
f48de2219971e9c4db5a8887f3e2eadd488990fd
-
SHA256
bbaada07b1e2af5ced0608f3c4eb9ced7e7af47b01d1e78a92894fdccd9135dd
-
SHA512
76ca2478fb8a2fc13fe94cd6177d365c0240e9c50e6e83054547884820faa794a176d9d3decd95335f06fe9ef73041703b38f1de26830bd2e3648569473233ac
-
SSDEEP
196608:b5vSinP/cz/ubWeOszS75sIH4qYM+GB6Ut8N/MoBoUFlEqAn:1LnP/czubXFzS75s+4bVUt8hM3qA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbaada07b1e2af5ced0608f3c4eb9ced7e7af47b01d1e78a92894fdccd9135dd
Files
-
bbaada07b1e2af5ced0608f3c4eb9ced7e7af47b01d1e78a92894fdccd9135dd.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 63KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 6KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.���� Size: - Virtual size: 14.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 10.7MB - Virtual size: 10.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ