Static task
static1
Behavioral task
behavioral1
Sample
3393ec62045d766e2182d9369d9d84b4aca6171edab63264347973c7734e64ecN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3393ec62045d766e2182d9369d9d84b4aca6171edab63264347973c7734e64ecN.exe
Resource
win10v2004-20240802-en
General
-
Target
3393ec62045d766e2182d9369d9d84b4aca6171edab63264347973c7734e64ecN
-
Size
59KB
-
MD5
f241076cd2af083d24517b9b6f2eb500
-
SHA1
fe5afdb2fd879b56876287708b9b2155098af48c
-
SHA256
3393ec62045d766e2182d9369d9d84b4aca6171edab63264347973c7734e64ec
-
SHA512
78116c0926bc79098213fc06190a426ce0932ae127a4e72316bd2672c155b95b0f6f55c8427f20d2a6a3ebdf21490b26c03ec5b8f8f64c2e7acb84ef206ab6e1
-
SSDEEP
768:CMvzmBU8MygcfRCA36+Q7BcjWvkCIbT+ANBInaQdz89LEO9T65c18/1H51Xdnhg2:ClyncEqd4Bhv4byAbIuoY+th
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3393ec62045d766e2182d9369d9d84b4aca6171edab63264347973c7734e64ecN
Files
-
3393ec62045d766e2182d9369d9d84b4aca6171edab63264347973c7734e64ecN.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ