Behavioral task
behavioral1
Sample
e361dd0e20b2f1541de53e3594ee20093fd926ffa49ef2896f8cb18627840173.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e361dd0e20b2f1541de53e3594ee20093fd926ffa49ef2896f8cb18627840173.exe
Resource
win10v2004-20220812-en
General
-
Target
e361dd0e20b2f1541de53e3594ee20093fd926ffa49ef2896f8cb18627840173
-
Size
334KB
-
MD5
aebd81cc97d3df58da4c8332a1bb9a8f
-
SHA1
fe88517ae75e2d16e4d581f02ba6af55ba5978bb
-
SHA256
e361dd0e20b2f1541de53e3594ee20093fd926ffa49ef2896f8cb18627840173
-
SHA512
29ddce933b64cdcba6b76f6ff366738a6828cebb4bddbf6ea0505e487bace6b6024f4fcb882a99818331c047283c272712ebd0dc139490c1356e1c8fff9b4c80
-
SSDEEP
6144:XsioJa1EAm4VhUvKWItfLpQ9d3LtlEAZ:vsAVVhUvCsd7tFZ
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule sample agile_net
Files
-
e361dd0e20b2f1541de53e3594ee20093fd926ffa49ef2896f8cb18627840173.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 330KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ