Static task
static1
Behavioral task
behavioral1
Sample
4bde20d730c0b274789a856689d87bd123081e4d5c5bdd1d845ac9410beef5d9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4bde20d730c0b274789a856689d87bd123081e4d5c5bdd1d845ac9410beef5d9N.exe
Resource
win10v2004-20241007-en
General
-
Target
4bde20d730c0b274789a856689d87bd123081e4d5c5bdd1d845ac9410beef5d9N
-
Size
59KB
-
MD5
33472a21072528eed2f41ab44586a4f0
-
SHA1
7fdc0982fd3aa355aead413d3c68ecb681286b91
-
SHA256
4bde20d730c0b274789a856689d87bd123081e4d5c5bdd1d845ac9410beef5d9
-
SHA512
979c09fb0718494ce8d1cd2dfc786109878e5b2ee8eddc530eb065b6ad251b95c518f2aadbf7ab71843ba7dcf3b787a20e3cf25d8410f878f6218549a55ec4f8
-
SSDEEP
768:0wQ668+otuSNv7klpsy1gvyRypni2UhaGnuDw8jIXU9YMEiyf/1H5wdqXdnhgPDS:/QWDuP11EyAi2UhNLSX9vzwJh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bde20d730c0b274789a856689d87bd123081e4d5c5bdd1d845ac9410beef5d9N
Files
-
4bde20d730c0b274789a856689d87bd123081e4d5c5bdd1d845ac9410beef5d9N.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ