Static task
static1
Behavioral task
behavioral1
Sample
872a554c5fc79c713c09717bff16d0c1ad0413ddce77ce84748540b6570f0f28N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
872a554c5fc79c713c09717bff16d0c1ad0413ddce77ce84748540b6570f0f28N.exe
Resource
win10v2004-20241007-en
General
-
Target
872a554c5fc79c713c09717bff16d0c1ad0413ddce77ce84748540b6570f0f28N
-
Size
80KB
-
MD5
81ee02e713101eb539f0ffd005046d00
-
SHA1
59b51856766098280f1d27d0c875427906de857c
-
SHA256
872a554c5fc79c713c09717bff16d0c1ad0413ddce77ce84748540b6570f0f28
-
SHA512
e7002891a3a232208a303ff92cc79cac75e8b9393ea1ac15a10a3f3c58b7f9430a16746675f070acc13702f168739541d0dd289159ee57ea992609bdcb86e927
-
SSDEEP
1536:pgqJObNwF4qEB2Tjzmq2H3k3ijHyHqnPzSzDfWqdMVrlEFtyb7IYOOqw4Tv:pg2feU3AHyHmPuzTWqAhELy1MTTv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 872a554c5fc79c713c09717bff16d0c1ad0413ddce77ce84748540b6570f0f28N
Files
-
872a554c5fc79c713c09717bff16d0c1ad0413ddce77ce84748540b6570f0f28N.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ