Behavioral task
behavioral1
Sample
e17b4a2c1b4014293714dfccb296a29c505920ca83e87c8e873967033f9ca744.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e17b4a2c1b4014293714dfccb296a29c505920ca83e87c8e873967033f9ca744.exe
Resource
win10v2004-20220901-en
General
-
Target
e17b4a2c1b4014293714dfccb296a29c505920ca83e87c8e873967033f9ca744
-
Size
469KB
-
MD5
2ac4bd868ce390a8b60414da15752c3b
-
SHA1
39cbcc7739ee99d415e76c9c59103cf5481fd78c
-
SHA256
e17b4a2c1b4014293714dfccb296a29c505920ca83e87c8e873967033f9ca744
-
SHA512
d495492275c3c89d098a04bee06e08f07f95e0843bb23d694f774b833f60f84c048d0419f02fecdd079841949df6257990b491d6e83f0cfad3e40423593ffa40
-
SSDEEP
6144:IfVSmVhUvKWItfLpQ9d3LtlEAZvCS5YcCQ7iLsjVaHkiyYNe3VFi1ROw3F6Zrjyb:IsmVhUvCsd7tFZa0oLNa
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule sample agile_net
Files
-
e17b4a2c1b4014293714dfccb296a29c505920ca83e87c8e873967033f9ca744.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ