Static task
static1
Behavioral task
behavioral1
Sample
6f95d0f48b3805c0d556ca08d0508c4549e88cae97501b211f4157f1237a14ac.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6f95d0f48b3805c0d556ca08d0508c4549e88cae97501b211f4157f1237a14ac.exe
Resource
win10v2004-en-20220113
General
-
Target
6f95d0f48b3805c0d556ca08d0508c4549e88cae97501b211f4157f1237a14ac
-
Size
3.0MB
-
MD5
4ae6721f6848dbf670f201e551e5c39b
-
SHA1
de62e6b1eb0e13b6859b42f45b14faae5022a440
-
SHA256
6f95d0f48b3805c0d556ca08d0508c4549e88cae97501b211f4157f1237a14ac
-
SHA512
c2db82acceb440886496a726e245f072a856be4be87890871bb22ef61eb2cd7104998ac508f825c226270d498f123f2d2165b114a7545ff2c4e8f0288e7cbf97
-
SSDEEP
49152:tXWkkjWunx5RGjJi1X7Ezv3RM7VpwRhWspN78OY66Ppe5HbG4Y4F+QNWYYOu4:tXWkkjTLoWg9wcRws37XIko4F
Malware Config
Signatures
-
Processes:
resource yara_rule sample themida
Files
-
6f95d0f48b3805c0d556ca08d0508c4549e88cae97501b211f4157f1237a14ac.exe windows x86
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 100KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Q*jr%Lr8 Size: 340KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Q*jr%Lr8 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 379KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ