Static task
static1
Behavioral task
behavioral1
Sample
c010fd9ba72ee15ab8aad81831527d317d21a38c87e507a50cb0285a47bbb787.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c010fd9ba72ee15ab8aad81831527d317d21a38c87e507a50cb0285a47bbb787.exe
Resource
win10v2004-20230220-en
General
-
Target
c010fd9ba72ee15ab8aad81831527d317d21a38c87e507a50cb0285a47bbb787.zip
-
Size
2.0MB
-
MD5
4bbe4bdbd1d5a4d4393ecef9ca4858cd
-
SHA1
95a6d9afb11c37c4d077992df844625e008e31fb
-
SHA256
311f5a2a320f8beacfef941dd045b2eaa3a82a22a8a9c616082ba50c2d67b2ad
-
SHA512
a2aa1b85bab1ed53948ced1299b973d9320374f0c4eb1e12f0962ba6f8a89bcb117f052908e1497386348c111cfe27b6eb01845f6a13017c7e3b62655757cd3b
-
SSDEEP
49152:l9RuDQn41x3FQKeESG5YRde1lGmapsFvv5EyJZoqTjB8:rR4Q41xSlvhRSlhapSv5l7oE8
Malware Config
Signatures
Files
-
c010fd9ba72ee15ab8aad81831527d317d21a38c87e507a50cb0285a47bbb787.zip.zip .ps1
Password: infected
-
c010fd9ba72ee15ab8aad81831527d317d21a38c87e507a50cb0285a47bbb787.exe.exe windows x64
Password: infected
6a66c55dd5fb9d7ca938b83486511180
Code Sign
56:ca:81:ef:dc:5e:fa:b8:42:75:cc:05:9f:f3:aa:7eCertificate
IssuerCN=Samsung JP Q32R404FHWI RC65R539FHIZCINot Before01/03/2023, 11:55Not After02/03/2033, 11:55SubjectCN=Samsung JP Q32R404FHWI RC65R539FHIZCI90:39:7f:9a:d2:4a:3a:13:f2:bd:91:5f:08:38:a9:43Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before11/05/2022, 00:00Not After10/08/2033, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #3,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
6e:c7:c2:bb:e2:2a:19:35:fb:0a:e7:af:fe:80:9a:9a:b5:e5:e7:2e:a2:dd:32:7e:7b:d2:f3:43:c9:0e:d6:1dSigner
Actual PE Digest6e:c7:c2:bb:e2:2a:19:35:fb:0a:e7:af:fe:80:9a:9a:b5:e5:e7:2e:a2:dd:32:7e:7b:d2:f3:43:c9:0e:d6:1dDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Samsung JP Q32R404FHWI RC65R539FHIZCI27/02/2023, 09:30 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shell32
SHGetDiskFreeSpaceExW
mscoree
_CorExeMain
advapi32
RegCloseKey
user32
CreateWindowExA
kernel32
GetModuleHandleA
Sections
.text Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 698KB - Virtual size: 698KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE