Behavioral task
behavioral1
Sample
740d2568f1f56ebac12251775e44e91196282a1caaf6c43386b7fb9c5190c4d6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
740d2568f1f56ebac12251775e44e91196282a1caaf6c43386b7fb9c5190c4d6.exe
Resource
win10v2004-20221111-en
General
-
Target
740d2568f1f56ebac12251775e44e91196282a1caaf6c43386b7fb9c5190c4d6
-
Size
474KB
-
MD5
7d0ae37fa10214e08bd703fcdc11ef97
-
SHA1
043c1d38de0b9aff3de431b28a0684a930008031
-
SHA256
740d2568f1f56ebac12251775e44e91196282a1caaf6c43386b7fb9c5190c4d6
-
SHA512
3e3e659e3143ce2b569f0c700216f252c3056d5c0bcccd3a63d379d4fb438cfd574ac98e012fd4c1b7edddea40e6e73bfa05634f865b71c2738da254addf212e
-
SSDEEP
12288:0XmChXYgOwlwB3QsFtbDxC83luFi5kC2Hgqam5Jtta8N/X1Q3jjN:0BIXi49fxB1Si5Xqam5
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule sample agile_net
Files
-
740d2568f1f56ebac12251775e44e91196282a1caaf6c43386b7fb9c5190c4d6.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 468KB - Virtual size: 467KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ