Behavioral task
behavioral1
Sample
14401b47e4824d138cb94704b43a7cd24cd46dac6b8fb7ff4cbb2edf44a12855N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
14401b47e4824d138cb94704b43a7cd24cd46dac6b8fb7ff4cbb2edf44a12855N.exe
Resource
win10v2004-20241007-en
General
-
Target
14401b47e4824d138cb94704b43a7cd24cd46dac6b8fb7ff4cbb2edf44a12855N.exe
-
Size
34KB
-
MD5
46e37fec58bd565d9aa5023caf0ea960
-
SHA1
1b30aad2d2a0016a797a04e3722d3149d87c1543
-
SHA256
14401b47e4824d138cb94704b43a7cd24cd46dac6b8fb7ff4cbb2edf44a12855
-
SHA512
f976104102f81e06a0fcc4fd29154b4e8ab7393766fc168d6ddaa84f3d44fd4d3d0a91f8d3bac464afe7720f8f398d88714ee25fbfea2badf08604d14c0affa4
-
SSDEEP
768:eEU07c92/EyTAYtxqfGNC0klI7C8yOvi3emUB:eg7wc1aGNC0klI7CPN3i
Malware Config
Signatures
-
Detects MyDoom family 1 IoCs
Processes:
resource yara_rule sample family_mydoom -
Mydoom family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 14401b47e4824d138cb94704b43a7cd24cd46dac6b8fb7ff4cbb2edf44a12855N.exe
Files
-
14401b47e4824d138cb94704b43a7cd24cd46dac6b8fb7ff4cbb2edf44a12855N.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ