Static task
static1
Behavioral task
behavioral1
Sample
dbdd63359fbfc9c51b573c102a64e175e99d4aca9312da6d12b156ed1373290fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbdd63359fbfc9c51b573c102a64e175e99d4aca9312da6d12b156ed1373290fN.exe
Resource
win10v2004-20241007-en
General
-
Target
dbdd63359fbfc9c51b573c102a64e175e99d4aca9312da6d12b156ed1373290fN
-
Size
4.9MB
-
MD5
661d0561ddceaf9ae6edf8a50b6c26c0
-
SHA1
b1dd6be08f907050574f7102dfc83fd7223c0179
-
SHA256
dbdd63359fbfc9c51b573c102a64e175e99d4aca9312da6d12b156ed1373290f
-
SHA512
c8b342af6e7180f99a0acf5c77a60a5b2d58c49c884dd929238797e27b79de8d9dece2d4444a7349f1e84ff036852a94f09608be24e80c0c56e80cc043719474
-
SSDEEP
49152:9m/xFnOvtaWIDn0a2qnqYQVMkL+q/vSWidGHp+NDGQUzbpDOfjxAkrQKl+RPAFIA:uaklJKvS0Hpe4zbpaAKQkroGIC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dbdd63359fbfc9c51b573c102a64e175e99d4aca9312da6d12b156ed1373290fN
Files
-
dbdd63359fbfc9c51b573c102a64e175e99d4aca9312da6d12b156ed1373290fN.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.petite Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE