Static task
static1
Behavioral task
behavioral1
Sample
dff9a1c2cb3b39fc8d822abc3b68e4a37f655a8ba8aa6e3d008e947dca9a3605.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dff9a1c2cb3b39fc8d822abc3b68e4a37f655a8ba8aa6e3d008e947dca9a3605.exe
Resource
win10v2004-20241007-en
General
-
Target
dff9a1c2cb3b39fc8d822abc3b68e4a37f655a8ba8aa6e3d008e947dca9a3605
-
Size
64KB
-
MD5
60a0f886f1cad45ee14f2abc99af9993
-
SHA1
bde9df1b17b5bdec7e99816975b6aba7d962b98d
-
SHA256
dff9a1c2cb3b39fc8d822abc3b68e4a37f655a8ba8aa6e3d008e947dca9a3605
-
SHA512
d5979c4686fffcdc5206a1081fbf915efbff90d146432ab1476ef9b495818fc9c06e43100edbcf82f668c2c4dfd94a8269c1a724af3e57796fca36e7c5d57aba
-
SSDEEP
1536:ZaWWz6WnOA2a5aSrLggmNg49Nqc1grcg0Ysw8AURuMQ1JNBYxFvlOYE8Rm0Z:EWMeag6ggmNg49Nqc8cg0Ysw8AURuMQG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dff9a1c2cb3b39fc8d822abc3b68e4a37f655a8ba8aa6e3d008e947dca9a3605
Files
-
dff9a1c2cb3b39fc8d822abc3b68e4a37f655a8ba8aa6e3d008e947dca9a3605.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jfbbql Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ