Static task
static1
Behavioral task
behavioral1
Sample
db813d24c389a9f9a18c32dcca5533f6902cf6f9b63a5deaaa992ead2738de84.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
db813d24c389a9f9a18c32dcca5533f6902cf6f9b63a5deaaa992ead2738de84.exe
Resource
win10v2004-20240802-en
General
-
Target
db813d24c389a9f9a18c32dcca5533f6902cf6f9b63a5deaaa992ead2738de84
-
Size
57KB
-
MD5
3e9c12e92e066b94f8acf0f74ade8aaf
-
SHA1
102338c41c013752e81bbe6bf1589a6ae1f97099
-
SHA256
db813d24c389a9f9a18c32dcca5533f6902cf6f9b63a5deaaa992ead2738de84
-
SHA512
f77f934532f94f5356075424dc9d7e1f37e7d2347f8d425fec1f74a250a30f0834f53d959de1529dda5cb0645bd6e4369ee152e3468df8b9adff45886ca979c0
-
SSDEEP
768:apPslhI7OM6d5g2JbJ9e9koGA56b0XYuZxGF3rzWBX5VoPSLWkEsyjTl6bPmkpWz:uPihI5wg2pJ9Wjj6otQWX5Jq6KkMK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db813d24c389a9f9a18c32dcca5533f6902cf6f9b63a5deaaa992ead2738de84
Files
-
db813d24c389a9f9a18c32dcca5533f6902cf6f9b63a5deaaa992ead2738de84.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ