Static task
static1
Behavioral task
behavioral1
Sample
8ac400d4b81b2d60722fd51a0dd0a31c424723f923c626f3b663ea194b51a85e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ac400d4b81b2d60722fd51a0dd0a31c424723f923c626f3b663ea194b51a85e.exe
Resource
win10v2004-20240802-en
General
-
Target
8ac400d4b81b2d60722fd51a0dd0a31c424723f923c626f3b663ea194b51a85e
-
Size
193KB
-
MD5
d0ed14b37eef78ab3a74989b71741b67
-
SHA1
853e58953b6c7995d7b6cea2efa6bb495f3eff0a
-
SHA256
8ac400d4b81b2d60722fd51a0dd0a31c424723f923c626f3b663ea194b51a85e
-
SHA512
c982b389aaf03bc2061b1cb17ec2717cc7b541913135575816ef52d8b947fe88872e05894450fd8551b5a9b24dbbc5cc4bea1c57be91d8c8d0089e90df111e96
-
SSDEEP
6144:afupkA8nvquaEp0jsRIDtiZtSE6lpqOnu:aRA8UbiZtTOqOnu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ac400d4b81b2d60722fd51a0dd0a31c424723f923c626f3b663ea194b51a85e
Files
-
8ac400d4b81b2d60722fd51a0dd0a31c424723f923c626f3b663ea194b51a85e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 158KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 12B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
SCRYPT Size: 77B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ