Behavioral task
behavioral1
Sample
b88951ceb296c8f01a8e13bc4efa4eb754361ee8ad3d64063d14489bc139a492.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b88951ceb296c8f01a8e13bc4efa4eb754361ee8ad3d64063d14489bc139a492.exe
Resource
win10v2004-20230220-en
General
-
Target
e86a6b6140b3caa0f022b617f145e96f.bin
-
Size
37KB
-
MD5
064fd9d179f139aecd4e85dff81bfcb6
-
SHA1
45deaaddb5b6d64e4cb9101b1b5f2b1fea10d931
-
SHA256
61821256c0b845ac3ef1c0dff06052b89d52b1884dcf70da7d187b6963c3527a
-
SHA512
09c76a80586456726ddf2e6e9a30e41cb4c9152fea6a6c5c12f9a1de710a7b81335706397ffacee8be69f7956c1fb96ac2d03f66698a2edacee0afff692db5b8
-
SSDEEP
768:+nXi9qoMgiNUFb+Iy8AQjrg2K47cgjUJVv+yP5aGz1obwE:+8pIQSb8Ln/cgjUz+yP5aGZoME
Malware Config
Signatures
-
Sodinokibi family
-
Sodinokibi/Revil sample 1 IoCs
Processes:
resource yara_rule static1/unpack001/b88951ceb296c8f01a8e13bc4efa4eb754361ee8ad3d64063d14489bc139a492.exe family_sodinokobi
Files
-
e86a6b6140b3caa0f022b617f145e96f.bin.zip
Password: infected
-
b88951ceb296c8f01a8e13bc4efa4eb754361ee8ad3d64063d14489bc139a492.exe.exe windows x86
Password: infected
1da9bd2a660139c2d8ce0baa10e11ec5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
SetEndOfFile
CloseHandle
CreateThread
GetModuleHandleW
GetProcAddress
LoadLibraryA
CopyFileW
MoveFileW
GetStdHandle
CreateFileW
WriteFile
OutputDebugStringW
LeaveCriticalSection
QueryPerformanceFrequency
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetCurrentThread
SetThreadAffinityMask
lstrlenW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
WriteConsoleW
QueryPerformanceCounter
EnterCriticalSection
IsProcessorFeaturePresent
user32
DialogBoxParamW
EndDialog
GetDlgItem
SetDlgItemInt
SetDlgItemTextW
CheckDlgButton
IsDlgButtonChecked
EnableWindow
SetWindowTextW
wsprintfW
MessageBoxW
SendMessageW
gdi32
CreateFontW
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hjl Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ