Behavioral task
behavioral1
Sample
360d96805b07c95b0ee43417c2baee4b66adf4deddc563c195b85025c9c79078.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
360d96805b07c95b0ee43417c2baee4b66adf4deddc563c195b85025c9c79078.exe
Resource
win10v2004-20221111-en
General
-
Target
360d96805b07c95b0ee43417c2baee4b66adf4deddc563c195b85025c9c79078
-
Size
980KB
-
MD5
49a240d3c28b2195041134e3746a6b90
-
SHA1
9b30562b3e3886044e6d0e098e8814ee90a10d11
-
SHA256
360d96805b07c95b0ee43417c2baee4b66adf4deddc563c195b85025c9c79078
-
SHA512
e595cc4fd5ebd614bdcd63f40962c219a042d75ce40dd3d7eab51a58fcd67deaac15ffc616597f7c00943a383b98223f0df4922235baf102cd3e9fe14a5562ac
-
SSDEEP
24576:9buQmMlRYL7wseSkDHqTNmIhvl1KFJSuDwb9F0mpsA:kIAh8D8cIhvTkJ1Uf
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
360d96805b07c95b0ee43417c2baee4b66adf4deddc563c195b85025c9c79078.exe windows x86
6636020a63c6d70c1a5ea0b0fd1f0f59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaPutOwner3
kernel32
DeleteCriticalSection
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CharUpperBuffW
Sections
.text Size: - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 965KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 968KB - Virtual size: 964KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ