Behavioral task
behavioral1
Sample
a5534cb35856419b371eb205ab203d0ec56db0a6887feba7e2238e4cc6aabb00.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a5534cb35856419b371eb205ab203d0ec56db0a6887feba7e2238e4cc6aabb00.exe
Resource
win10v2004-20220812-en
General
-
Target
a5534cb35856419b371eb205ab203d0ec56db0a6887feba7e2238e4cc6aabb00
-
Size
165KB
-
MD5
baa80e6f67617d3b1b278e9691c402dc
-
SHA1
0f0dcdca17d3a2f9eab5ded65131f9d96ff0d3ab
-
SHA256
a5534cb35856419b371eb205ab203d0ec56db0a6887feba7e2238e4cc6aabb00
-
SHA512
24666b171737fd6a75ea0f00f80c1a9a5e97779b4d39c54f0161484064bf81eb95df9b808accc7a5d899d8f60962c186ae65d7b706cb1ce0f91a787e08ce5d86
-
SSDEEP
3072:JoDqR9vK7ZktBOgC65uWhIwrXferssCfinalwd9nEp2Ivu9q/GlL4SGiJR:2XZktYu3r2YLqaqd9E1vuMIL/b
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule sample agile_net
Files
-
a5534cb35856419b371eb205ab203d0ec56db0a6887feba7e2238e4cc6aabb00.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ