Static task
static1
Behavioral task
behavioral1
Sample
6c58b3c0b8fcd06a58d67e5936423b0f6389b52d2b85c135d1393c521fd8b473.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c58b3c0b8fcd06a58d67e5936423b0f6389b52d2b85c135d1393c521fd8b473.exe
Resource
win10v2004-20241007-en
General
-
Target
6c58b3c0b8fcd06a58d67e5936423b0f6389b52d2b85c135d1393c521fd8b473
-
Size
1.9MB
-
MD5
cbd13cc154965e4c804a55031154c924
-
SHA1
d39e12ed7bfbb407cd0ded85951cb179e3012c0c
-
SHA256
6c58b3c0b8fcd06a58d67e5936423b0f6389b52d2b85c135d1393c521fd8b473
-
SHA512
408be386c62ef25bbaaf70a35d7b41aa77b20ac831b590332a5d543dcbf65ec30bdccf49606cc7ead07cf914b2927759b706e7c0b2ca1f561a3c62bf145ad582
-
SSDEEP
49152:FQw0mXvswij07jcW2o60EO6OptIpw4IMR:FQekwiw7ga7pepIMR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c58b3c0b8fcd06a58d67e5936423b0f6389b52d2b85c135d1393c521fd8b473
Files
-
6c58b3c0b8fcd06a58d67e5936423b0f6389b52d2b85c135d1393c521fd8b473.exe windows:5 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 147KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hioorium Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tgzcveup Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE