Static task
static1
Behavioral task
behavioral1
Sample
5f6bbd8a228200f32915edd97f2762734b7e45fb24a3cf01ac838090e7e4d45e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5f6bbd8a228200f32915edd97f2762734b7e45fb24a3cf01ac838090e7e4d45e.exe
Resource
win10-en-20211208
General
-
Target
5f6bbd8a228200f32915edd97f2762734b7e45fb24a3cf01ac838090e7e4d45e
-
Size
1.2MB
-
MD5
048aadaef3ed51a5c0bdc1a0a742fbcd
-
SHA1
3864a99638760f76e76ac65ed2943912079c0b98
-
SHA256
5f6bbd8a228200f32915edd97f2762734b7e45fb24a3cf01ac838090e7e4d45e
-
SHA512
fbfbc0c7dc93114e8d555b3402c75343801c4f813f53fcb87a6c9234dc9ddba17e5e8f68ba6a16e1f1e79b51c3041fd172008c97ba884d368996cb648d08dce1
-
SSDEEP
24576:Xxgth24vQjUJuJ5kpeuI5YMuGQn65zyYQvOkLClgVIH06iy1:eFk7i3eVQ2qC2IU6iu
Malware Config
Extracted
rustybuer
https://awmelisers.com/
Signatures
-
Rustybuer family
Files
-
5f6bbd8a228200f32915edd97f2762734b7e45fb24a3cf01ac838090e7e4d45e.exe windows x86
718dab72a5522ea0c2f11dbdacb9433c
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtQueryDefaultLocale
RtlCaptureContext
RtlUnwind
kernel32
CloseHandle
GetCurrentProcess
SetLastError
GetModuleFileNameW
GetLastError
GetProcessHeap
HeapFree
CreateFileW
Sleep
AddVectoredExceptionHandler
SetThreadStackGuarantee
HeapAlloc
HeapReAlloc
GetVolumePathNameW
GetDiskFreeSpaceW
GetModuleHandleA
GetProcAddress
CreateToolhelp32Snapshot
TlsGetValue
TlsSetValue
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
AcquireSRWLockShared
ReleaseSRWLockShared
VirtualAlloc
GetStdHandle
GetConsoleMode
WriteFile
WriteConsoleW
GetCurrentDirectoryW
GetCurrentThread
ReleaseMutex
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
TlsAlloc
GetModuleHandleW
FormatMessageW
InitializeCriticalSection
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetHandleInformation
ExitProcess
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
CreateThread
GetSystemInfo
GetVolumeInformationA
Process32Next
Process32First
GetEnvironmentVariableW
DecodePointer
SetFilePointerEx
LCMapStringW
CompareStringW
HeapSize
GetStringTypeW
GetFileType
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetCommandLineW
GetConsoleCP
FlushFileBuffers
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsFree
FreeLibrary
LoadLibraryExW
RaiseException
GetModuleHandleExW
GetCommandLineA
advapi32
RegQueryValueExW
RegOpenKeyExW
GetUserNameW
GetTokenInformation
OpenProcessToken
GetCurrentHwProfileW
SystemFunction036
bcrypt
BCryptGenRandom
netapi32
NetWkstaGetInfo
user32
GetSystemMetrics
ws2_32
getsockname
accept
ioctlsocket
WSASend
send
WSARecv
recv
listen
WSASocketW
freeaddrinfo
getaddrinfo
WSACleanup
WSAStartup
WSAGetLastError
bind
gethostname
getpeername
select
connect
setsockopt
getsockopt
closesocket
Sections
.text Size: 605KB - Virtual size: 604KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 580KB - Virtual size: 579KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ