Behavioral task
behavioral1
Sample
1772-55-0x0000000000A30000-0x00000000014A5000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1772-55-0x0000000000A30000-0x00000000014A5000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1772-55-0x0000000000A30000-0x00000000014A5000-memory.dmp
-
Size
10.5MB
-
MD5
0f4249ccdfaafb516321ca41c245b95b
-
SHA1
6ac21503f5ff068e80709704c83aa5ae497934f6
-
SHA256
3dbb1c23f741c5357a7e24705a68373bf2d434d11cc34f241440abde8ff18c4d
-
SHA512
b93c4a8fcfb2bfaf0c0e518dc88bf8baa2fb11f79c2a0075232596424bb33609c5675431ebe70c3bdf85a5570f3b28a0d1cca5c65fb2a4344e4145f5d2d15ba8
-
SSDEEP
196608:Scb/Py7QmoNDR7ly4XnrNJdzLXAqUmWQSwzAETr8T+Ri4osI3jhMSN:X/R1qAh/zLwqUsbzQTudoss
Malware Config
Signatures
-
Privateloader family
-
resource yara_rule sample vmprotect
Files
-
1772-55-0x0000000000A30000-0x00000000014A5000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 4.8MB - Virtual size: 4.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 181KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ