General
-
Target
13b9946788e24e61351377d877b5bc1e3294e1a17456800f68a994923fd2562b
-
Size
776KB
-
MD5
8d1a2dbf8171ffe9e87bfccc57818ccf
-
SHA1
766f1dbe5a7d4e818018af6c2881c58c3f874fb4
-
SHA256
13b9946788e24e61351377d877b5bc1e3294e1a17456800f68a994923fd2562b
-
SHA512
b24f3d2e310ccbcd30207cd034ca3dcb4401b697969a5c05793f02a823b35917e820df74eb0f0445ad2e90f4c6b8300aea83c32cde4da1f9945c93fd703b05fd
-
SSDEEP
12288:5ucgkaQ/56vUcUsr3oSXvpuFFrJLRJHjC1LlXyr8ANb/yCLYfw7Op8Rdb+:ocghi0fXXsFbLzH21LlCr8ebKEDxdb
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
13b9946788e24e61351377d877b5bc1e3294e1a17456800f68a994923fd2562b.exe windows x86
00d215ed59c06f739575f7bb1d2f967c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetVersion
DeleteCriticalSection
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CharUpperBuffW
Sections
.text Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 374KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 652KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 752KB - Virtual size: 749KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ