Static task
static1
Behavioral task
behavioral1
Sample
3db4ae8a52e3d753e7e00b4d4cd7414a1ea4673113a6a61ee956983a572f4c06.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3db4ae8a52e3d753e7e00b4d4cd7414a1ea4673113a6a61ee956983a572f4c06.exe
Resource
win10v2004-20240802-en
General
-
Target
3db4ae8a52e3d753e7e00b4d4cd7414a1ea4673113a6a61ee956983a572f4c06
-
Size
57KB
-
MD5
324b774a5cc737aa0fe39be7406da4b3
-
SHA1
31e048b52aeb7e9229fb014fa93c98e16d5a1161
-
SHA256
3db4ae8a52e3d753e7e00b4d4cd7414a1ea4673113a6a61ee956983a572f4c06
-
SHA512
6307dc64b1a81330b4f12cd285b29a9116a1f71e38ab23dd9dab3db1017830fbc714cfe0539f75d90fff76b1c68345cb35b67618790fca9dc059e13ffb50f5fe
-
SSDEEP
768:GQxT+qeVoytAHIGlw3vPM6DsvfbddmLqE1qH9XGKrX6gjVVG/ulKtX/1H54Xdnhg:VeVo2mlw3v3WJdmLoH1GtyVGWlKt9Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3db4ae8a52e3d753e7e00b4d4cd7414a1ea4673113a6a61ee956983a572f4c06
Files
-
3db4ae8a52e3d753e7e00b4d4cd7414a1ea4673113a6a61ee956983a572f4c06.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ