Static task
static1
Behavioral task
behavioral1
Sample
9c51fac51a3868e74677846c5b5a7f4a2dc35ef1dd9bb3a6e7104987bf75ff9e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
9c51fac51a3868e74677846c5b5a7f4a2dc35ef1dd9bb3a6e7104987bf75ff9e.exe
Resource
win10v2004-en-20220112
General
-
Target
9c51fac51a3868e74677846c5b5a7f4a2dc35ef1dd9bb3a6e7104987bf75ff9e
-
Size
3.0MB
-
MD5
2e2a0de7a60e907ffda9f16ec49f66c1
-
SHA1
4d346214a6fd67b35e837b397a4ba51d79dd20e0
-
SHA256
9c51fac51a3868e74677846c5b5a7f4a2dc35ef1dd9bb3a6e7104987bf75ff9e
-
SHA512
e1b98838783a3ba1e3dcafac62f4362b0e29e450e9d33983f6f81246299f2e5cef90fa23fd5de98918a6d19f8a9eb08d778c14b88af92009bf318443bca3c012
-
SSDEEP
49152:IokYwHy3HO4XI4s/25VneC8V0euoqax775489ssZe4LKRr2uuL6+QNWYYOu4:rZwHH4Y4T5VnfwBqA775Njzel2uK6
Malware Config
Signatures
-
Processes:
resource yara_rule sample themida
Files
-
9c51fac51a3868e74677846c5b5a7f4a2dc35ef1dd9bb3a6e7104987bf75ff9e.exe windows x86
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 100KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
-xZNxM7F Size: 340KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
-xZNxM7F Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 379KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ