Static task
static1
Behavioral task
behavioral1
Sample
b77a5d8dff420a3a044b11c6082726b3e680985ffc1487b986f0d97ca673c281.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b77a5d8dff420a3a044b11c6082726b3e680985ffc1487b986f0d97ca673c281.exe
Resource
win10v2004-en-20220112
General
-
Target
b77a5d8dff420a3a044b11c6082726b3e680985ffc1487b986f0d97ca673c281
-
Size
3.0MB
-
MD5
38f66ee7fcc7afbf0a10298bbc46a7ab
-
SHA1
9692b650cd278ad3c7ca66c5663abd944266291e
-
SHA256
b77a5d8dff420a3a044b11c6082726b3e680985ffc1487b986f0d97ca673c281
-
SHA512
207cd2cd6a2ea1a4b314077a58195ebd4740cd865483bc72a81331deb25285facd5b822977edd098bca2f8eae6e13787eff3d972df703433a804981b5ed7d773
-
SSDEEP
49152:Z58ZoI9Z9rqyY00cWSLHOjpEbPvMK5jzBIt90R1jKsgxDQC/VQAAMzt/C+QNWYY:Z5GoqZ92yY00Zdps0YzSU11VSq
Malware Config
Signatures
-
Processes:
resource yara_rule sample themida
Files
-
b77a5d8dff420a3a044b11c6082726b3e680985ffc1487b986f0d97ca673c281.exe windows x86
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 100KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
-xZNxM7F Size: 340KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
-xZNxM7F Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 379KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ