Static task
static1
Behavioral task
behavioral1
Sample
5fd6324374e3fde1e8d731cbf87622ac5045cd47c61b794c9748eabefad57cf2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5fd6324374e3fde1e8d731cbf87622ac5045cd47c61b794c9748eabefad57cf2N.exe
Resource
win10v2004-20240802-en
General
-
Target
5fd6324374e3fde1e8d731cbf87622ac5045cd47c61b794c9748eabefad57cf2N
-
Size
57KB
-
MD5
d5402e7169a45bd5adda34d1d0c39c30
-
SHA1
4d09a626a08c9a54e656716e0467552e260ac00c
-
SHA256
5fd6324374e3fde1e8d731cbf87622ac5045cd47c61b794c9748eabefad57cf2
-
SHA512
6f72a6e7b631e6e9f219376cea82ffe722dfee2a09cadafac487fe12a280be49d19dd9e5109e5c638fc9025dbb5bf52b04a58ed47cc992e70e17bb1f54cc1d97
-
SSDEEP
768:WF7XzevAD5MTFXwKcOre5WWaUleszeEQlwhzVpAiXHt6Ssa3OAk4Hd5J/1H5S4XQ:WF+vg5/+W5l36lwh5jzOAZHXcK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5fd6324374e3fde1e8d731cbf87622ac5045cd47c61b794c9748eabefad57cf2N
Files
-
5fd6324374e3fde1e8d731cbf87622ac5045cd47c61b794c9748eabefad57cf2N.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ