Static task
static1
Behavioral task
behavioral1
Sample
af6f2c76b6e841fa5735ab579e8f8a94f26db08a99aae68908c5a714d683bc65.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
af6f2c76b6e841fa5735ab579e8f8a94f26db08a99aae68908c5a714d683bc65.exe
Resource
win10v2004-20241007-en
General
-
Target
af6f2c76b6e841fa5735ab579e8f8a94f26db08a99aae68908c5a714d683bc65
-
Size
64KB
-
MD5
3222b30de1ba955cbcab3776c21c846c
-
SHA1
749809b74c753c0c826063e5a6542defbb286ef9
-
SHA256
af6f2c76b6e841fa5735ab579e8f8a94f26db08a99aae68908c5a714d683bc65
-
SHA512
b97a890fa46290dfa6d34a3145d5d31182e99da9fb82bc8d297386cb0d4f5014588eccae6c3f5f8684e6ea361a3211c6291aa34015af89c5cab210186cbc75b5
-
SSDEEP
768:wCtHtbB7YfQ3fiixt9JC+RjMPoqY2aL0az17MD04atCPU2p/1H5CXdnh1AuxYbIO:wkH/7YfQfbtRQPBaFzWwdt12LuXdZgQe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource af6f2c76b6e841fa5735ab579e8f8a94f26db08a99aae68908c5a714d683bc65
Files
-
af6f2c76b6e841fa5735ab579e8f8a94f26db08a99aae68908c5a714d683bc65.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kofbl Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ