WUhf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET.exe
Resource
win10v2004-20241007-en
General
-
Target
82b9e2a2ba3beb30b1ac58cdea177c9a69aa83c6f6e969c66a12dc4e67bce70e
-
Size
678KB
-
MD5
833fab57389d9754fa187be91522f1e2
-
SHA1
0e3404ca54d0ea2098b6084c4d692e4d31ae9f1a
-
SHA256
82b9e2a2ba3beb30b1ac58cdea177c9a69aa83c6f6e969c66a12dc4e67bce70e
-
SHA512
92923d54fa1960d0e712189287cc6ac48f9fda5a9ff75fe43fc14db33f60fdbbd18c9d09aa27c74fd3b075fd6a9490f070eef9e99daace8d564d4bfe9f53d0ba
-
SSDEEP
12288:AeFmJXRZqQdYesdWhSJmDrqR2Y9n1YZyuHB2RnMDutAJSryUN:Aom0U9g3R2wnhYBwMDutkSOK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET.exe
Files
-
82b9e2a2ba3beb30b1ac58cdea177c9a69aa83c6f6e969c66a12dc4e67bce70e.zip
-
RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 737KB - Virtual size: 736KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ