Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Hooker.ATA_virussign.com_cbdd63aae4b461e98523957c3c551e41.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.Hooker.ATA_virussign.com_cbdd63aae4b461e98523957c3c551e41.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Hooker.ATA_virussign.com_cbdd63aae4b461e98523957c3c551e41.exe
-
Size
50KB
-
MD5
cbdd63aae4b461e98523957c3c551e41
-
SHA1
da3aa7d25bb7f4a1284efb66791591643129099b
-
SHA256
9cb38c679a11ce4dcbc411d62e8b6c509bebdc49e3f8633dfb7ccf782c4eaef6
-
SHA512
3f020ae2bf1fc77c47fd6c42d9ae1eccaaa0a90c7f6d851b315ef097088dc62d41fd018f0869ad12b6d38f8e4d3d9648184676c4f4f218d1ae27270277f5e50b
-
SSDEEP
1536:9RFsgAlHWPLaU+4n8BN0c9n/Oq/rkOu50+tJ/1:bHA0lT8BN19/drkO9uJ/1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Trojan.Hooker.ATA_virussign.com_cbdd63aae4b461e98523957c3c551e41.exe
Files
-
Trojan.Hooker.ATA_virussign.com_cbdd63aae4b461e98523957c3c551e41.exe.exe windows:4 windows x86 arch:x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
.text Size: 39KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE