Behavioral task
behavioral1
Sample
4ab3e216ff005776f05ae13d2e962b2c1025e3730aa07ea51f0619d709b6b712.exe
Resource
win7-20220812-en
General
-
Target
4ab3e216ff005776f05ae13d2e962b2c1025e3730aa07ea51f0619d709b6b712
-
Size
4.4MB
-
MD5
b6bae793c4ff24f627908b895fd3f2f2
-
SHA1
3441c797050e4670b7b616d7d204c39e6fe1bb83
-
SHA256
4ab3e216ff005776f05ae13d2e962b2c1025e3730aa07ea51f0619d709b6b712
-
SHA512
986afc3605c70341c4d5e3d51f1fc2d74fffcdd03abba24f08a6e1140ea052aec35580c59913ab2d9c9e62bcde7c23d7bbde214beebcb7c5f8da27de4ee1dfda
-
SSDEEP
98304:5+DyuHpNeV/riwz58R42is6e3RXjOWDucCnp1DA9sv7o2s2kbsUOEGx4VKP3Q9OK:kDRdjjqPdDsDbsU0akJyxL405+fiX
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule sample agile_net
Files
-
4ab3e216ff005776f05ae13d2e962b2c1025e3730aa07ea51f0619d709b6b712.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ