Static task
static1
Behavioral task
behavioral1
Sample
26d76f5d90188a9461bed041e372975875208394e16963a26b8404e240cfa5ac.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
26d76f5d90188a9461bed041e372975875208394e16963a26b8404e240cfa5ac.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
26d76f5d90188a9461bed041e372975875208394e16963a26b8404e240cfa5ac.exe
Resource
win11-20241007-en
General
-
Target
26d76f5d90188a9461bed041e372975875208394e16963a26b8404e240cfa5ac.zip
-
Size
35KB
-
MD5
9c4187f65f4d6dade38ebf7c0454e9c1
-
SHA1
d5d3aaa4627ae9cd9e715233ae5e860c473ce5c5
-
SHA256
2b6e0e19053485b5ee0b0f7e5cd2deb383d71d8dd38ff91464d906ccf28eb74e
-
SHA512
3abee88db484add69ce103448ccb411326ba02dd943df8b5d831fe6273124eb22cfc661da1e9279bd2c55b6d1f296ee49ad7d9757f513dee56fe47c91b7b82e6
-
SSDEEP
768:TveKy8W8MgAIRq8F8/RSNTb5hP+GxtmBNkt7oknttMfjZC9B0F9y0y7oOGfwF:TveD8UCEANBhmG+G/MflC9B0F01UOGoF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/26d76f5d90188a9461bed041e372975875208394e16963a26b8404e240cfa5ac
Files
-
26d76f5d90188a9461bed041e372975875208394e16963a26b8404e240cfa5ac.zip.zip
Password: infected
-
26d76f5d90188a9461bed041e372975875208394e16963a26b8404e240cfa5ac.exe windows:4 windows x86 arch:x86
Password: infected
a421b2b9c1de3277cdcc888832346c18
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm50
__vbaVarSub
ord690
__vbaStrI2
_CIcos
_adj_fptan
__vbaStrI4
__vbaFreeVar
__vbaLateIdCall
__vbaLenBstr
__vbaStrVarMove
__vbaPut3
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaStrCat
ord660
__vbaSetSystemError
__vbaHresultCheckObj
__vbaLenVar
_adj_fdiv_m32
__vbaForEachCollObj
__vbaExitProc
__vbaOnError
__vbaObjSet
ord595
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
__vbaFpR4
__vbaBoolVar
ord520
_CIsin
ord631
__vbaNextEachCollObj
__vbaChkstk
__vbaFileClose
EVENT_SINK_AddRef
__vbaStrCmp
__vbaR4Str
__vbaObjVar
__vbaI2I4
DllFunctionCall
__vbaCastObjVar
__vbaStrR4
_adj_fpatan
__vbaR4Var
__vbaLateIdCallLd
EVENT_SINK_Release
__vbaNew
ord600
_CIsqrt
__vbaObjIs
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaI2Str
__vbaFPException
__vbaStrVarVal
__vbaI2Var
ord537
ord645
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaInStr
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
ord681
__vbaI4Str
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
ord687
__vbaI4Var
ord689
__vbaVarDup
__vbaFpI4
__vbaLateMemCallLd
_CIatan
__vbaStrMove
__vbaI2ErrVar
ord618
__vbaCastObj
_allmul
__vbaLateIdSt
_CItan
_CIexp
__vbaFreeObj
__vbaFreeStr
ord581
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ