Static task
static1
Behavioral task
behavioral1
Sample
d26850e66d0471f4b7f1010addf3405409135ea4a45b32d1474eadde0753ce36N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d26850e66d0471f4b7f1010addf3405409135ea4a45b32d1474eadde0753ce36N.exe
Resource
win10v2004-20241007-en
General
-
Target
d26850e66d0471f4b7f1010addf3405409135ea4a45b32d1474eadde0753ce36N
-
Size
158KB
-
MD5
1a0baf40596835da68b11c2aa30e5380
-
SHA1
65a4f321073a7d086ed2a821fface208dc0c9d19
-
SHA256
d26850e66d0471f4b7f1010addf3405409135ea4a45b32d1474eadde0753ce36
-
SHA512
5c19d913f584a2ed5cba09ef6a7d1b13a83fa57eccbdc8c8ba03c6174def06df1c04b1e344713d38008024c63d3285990fa9dccbb078dd66fdd75953d194af52
-
SSDEEP
3072:nHYVfPdbcrWq6+Pdg1B6/CqtPv+JkDV54SyvN7un4+u+wCLN:4TI6/kC16b4dj+pbLN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d26850e66d0471f4b7f1010addf3405409135ea4a45b32d1474eadde0753ce36N
Files
-
d26850e66d0471f4b7f1010addf3405409135ea4a45b32d1474eadde0753ce36N.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 41KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 160KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 15KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.petite Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE