Behavioral task
behavioral1
Sample
Proxy Scraper v1.0.exe
Resource
win7-20220812-en
General
-
Target
Proxy Scraper v1.0.exe
-
Size
19.0MB
-
MD5
ba4112c8afd4b806e6a612ae1b7f5688
-
SHA1
bf07fd4b46dcc7e591538bc151dd592343613b68
-
SHA256
67a6b520ad486c6e622252212c7045f18393bc6d6b20e404c60fde6a060b4d3f
-
SHA512
f1636ba7acb43b71f5a514d8ae548d557c9a273d3afb4fd36dc7e9b6049eecad416ea2264bc63870c9531fa6fe19472b8f30c54bb524241fa18c49c55940435c
-
SSDEEP
393216:dUEiVOP83XjuK5/NghHnNc7U4mHotcGOpuDT03nTQo8wR53xVu7vHhqBa4Cs:eVw8qy/N8HN8rhOcQ3nTQApHCpqBa4C
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule sample agile_net
Files
-
Proxy Scraper v1.0.exe.exe windows x64
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 19.0MB - Virtual size: 19.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ