Static task
static1
Behavioral task
behavioral1
Sample
730eb84bfb665b290412de47b6fe37d5e9d5d0b4f333b58261ef29e4ef190f77N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
730eb84bfb665b290412de47b6fe37d5e9d5d0b4f333b58261ef29e4ef190f77N.exe
Resource
win10v2004-20241007-en
General
-
Target
730eb84bfb665b290412de47b6fe37d5e9d5d0b4f333b58261ef29e4ef190f77N
-
Size
57KB
-
MD5
0925b7bc0cc122b1348be3b5e3345300
-
SHA1
f3ca15d0ddbd721050a8f946f22d4fad0944947f
-
SHA256
730eb84bfb665b290412de47b6fe37d5e9d5d0b4f333b58261ef29e4ef190f77
-
SHA512
b99668f244742d77a592e255c405d4fd2dbacb4c7cda0834978392188b243eea587410e904dacad8f38a61cda93edc34bc90f61567bbbc0a63d69a05cc23825e
-
SSDEEP
768:mkThIztOQsW1qW7aW1YbRUe5Q4MsEJgiGS8qHQ4unPjt8NeFs+/1H5zkXdnhg:5WZOQs6am45Q4MFJbHIPR8NOsUd+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 730eb84bfb665b290412de47b6fe37d5e9d5d0b4f333b58261ef29e4ef190f77N
Files
-
730eb84bfb665b290412de47b6fe37d5e9d5d0b4f333b58261ef29e4ef190f77N.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ