Static task
static1
Behavioral task
behavioral1
Sample
WebhookSpammerV5.py.exe
Resource
win10v2004-20240802-en
General
-
Target
WebhookSpammerV5.py.exe
-
Size
10.6MB
-
MD5
70384d85a21d9f639889e3b7f135e8fc
-
SHA1
a3b580e621589429d1e7424184ef76947e8b5261
-
SHA256
e1fa76e4362d5d055dfe50419bbaab2f3233975d9adfa1d8c893e6d744584d7e
-
SHA512
8c721d650606b696feca0842db610c13a4e335960aa08d40067c6dc2b010bc383cdb0707c9d2acc5748460eac473458933d853a2f14aa689217a655b51c73053
-
SSDEEP
196608:P1UMC1TIWdHxaxVrr88lfyyzIYCpBeERHwOncjIwHX7hzyvg/vMuD:P1uFIWLaf8gs/pBdC6cMozyvg/0u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource WebhookSpammerV5.py.exe
Files
-
WebhookSpammerV5.py.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 10.6MB - Virtual size: 10.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ