Static task
static1
General
-
Target
shl-t2rf-as.py.deob.py.bin.exe
-
Size
352KB
-
MD5
98de174aa68f9fcb356262ccdd548861
-
SHA1
ddc3fe9a0bce70a0ca68eec3bd131c78f922a052
-
SHA256
c2c026e601046e29c2ddc4d6608e562a3ab33c869983125ff1faba3e4a46b66c
-
SHA512
369d2723a947a8c163fcccf102ef262dc2237122e291f4f8b74e7a5bc0c11ee8d9615c23cd550b43ec59c254ae58c69680eb41533159b69ea52d2d7f577bdc3d
-
SSDEEP
6144:FFg+5AWj7+B7YqnqbopO6luag+ShMH9O1BNINgKXAsC:Fi+5AWjy7YGXplEDMo7IGKXAV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource shl-t2rf-as.py.deob.py.bin.exe
Files
-
shl-t2rf-as.py.deob.py.bin.exe.exe windows:6 windows x64 arch:x64
9d63601b75db6820cb6e18c76c455c6b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentProcess
InitializeProcThreadAttributeList
IsProcessorFeaturePresent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UpdateProcThreadAttribute
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 83KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.retplne Size: 512B - Virtual size: 140B
_sysc Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ