Static task
static1
Behavioral task
behavioral1
Sample
457b02e1e2126b1d69dea838aa4b726523f52664f68d12ccd02fefa37a3d8262.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
457b02e1e2126b1d69dea838aa4b726523f52664f68d12ccd02fefa37a3d8262.exe
Resource
win10v2004-20250217-en
General
-
Target
457b02e1e2126b1d69dea838aa4b726523f52664f68d12ccd02fefa37a3d8262
-
Size
37KB
-
MD5
9f4321e53b454d9df127516626564ec4
-
SHA1
e9499026aabbd4f8c8dff937713dbe78616eb5a5
-
SHA256
457b02e1e2126b1d69dea838aa4b726523f52664f68d12ccd02fefa37a3d8262
-
SHA512
d392ca5ca22d8f6e85bcfe23f52513639fc89a3dfa86c41015aec05ef4c6a3616b67dd3f27f5c47dbf53a6ac3fb1ce5adbbfc8603f8430a11adc25d5c8058a58
-
SSDEEP
384:oHMZMNFfSCz8QprwAU50vcAgARfQhcZHnxr7rzROv4n8M0+JnI8k:tZ4FfZ8QprwALvsA5Qhcpxr7nAbcI8k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 457b02e1e2126b1d69dea838aa4b726523f52664f68d12ccd02fefa37a3d8262
Files
-
457b02e1e2126b1d69dea838aa4b726523f52664f68d12ccd02fefa37a3d8262.exe windows:1 windows x86 arch:x86
f736665ac33b6775ed4c156ddf9c52af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
inet_addr
recv
send
socket
kernel32
ExitProcess
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetFileSize
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetWindowsDirectoryA
CopyFileA
IsBadReadPtr
LoadLibraryA
MapViewOfFile
OpenMutexA
OpenProcess
Process32First
Process32Next
CreateFileA
ReadFile
CreateFileMappingA
ReadProcessMemory
ReleaseMutex
RtlUnwind
RtlZeroMemory
SetCurrentDirectoryA
SetEndOfFile
SetFileAttributesA
SetFilePointer
SetThreadPriority
CreateMutexA
TerminateProcess
UnmapViewOfFile
VirtualProtect
WriteFile
CreateThread
CreateToolhelp32Snapshot
user32
LoadCursorA
SetTimer
KillTimer
RegisterClassA
GetMessageA
TranslateMessage
DispatchMessageA
CreateWindowExA
DefWindowProcA
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
_strcmpi
toupper
abort
exit
fclose
feof
fgets
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
malloc
memcmp
memcpy
memset
raise
rand
signal
srand
strcat
strchr
strcmp
strstr
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE