Static task
static1
Behavioral task
behavioral1
Sample
pg_dump.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
pg_dump.exe
Resource
win10v2004-20230221-en
General
-
Target
pg_dump.exe
-
Size
1.1MB
-
MD5
98d6d06e528f5fe0d4d6434a1002d81e
-
SHA1
0b800ee7bc8df60170db0e0cfe03e11af90af9d2
-
SHA256
125ed194f9798f6d616c7d7a9a4b0ee537c1f8ee7caa676cfa8c8b62d2a29525
-
SHA512
f69d37d8554b25735df8f6961b8471bb767cd03d8d733e2d7b5558eb637e583aaca7967b6f150be85209f026a934aa092d0e53dfeaceccaa0b1e07790cef0b22
-
SSDEEP
24576:DAwPDb2PpmTtWiOyqpx28/tgr7hKmhlZt+:5PDb2opNOykIlZt+
Malware Config
Signatures
Files
-
pg_dump.exe.exe windows x64
21a1744015455965d42f951b037dcbc4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
libpq
PQcancel
PQclear
PQclientEncoding
PQconnectdbParams
PQconnectionNeedsPassword
PQconnectionUsedPassword
PQdb
PQerrorMessage
PQescapeStringConn
PQexec
PQfinish
PQfname
PQfnumber
PQfreeCancel
PQfreemem
PQftype
PQgetCancel
PQgetCopyData
PQgetResult
PQgetisnull
PQgetlength
PQgetvalue
PQmblen
PQnfields
PQntuples
PQparameterStatus
PQpass
PQputCopyData
PQputCopyEnd
PQresultStatus
PQserverVersion
PQsetClientEncoding
PQsetNoticeProcessor
PQstatus
PQtransactionStatus
PQunescapeBytea
appendBinaryPQExpBuffer
appendPQExpBuffer
appendPQExpBufferChar
appendPQExpBufferStr
createPQExpBuffer
destroyPQExpBuffer
enlargePQExpBuffer
initPQExpBuffer
lo_close
lo_create
lo_open
lo_read
lo_write
pg_char_to_encoding
pg_encoding_to_char
printfPQExpBuffer
resetPQExpBuffer
termPQExpBuffer
advapi32
AddAccessAllowedAceEx
AddAce
GetAce
GetAclInformation
GetLengthSid
GetTokenInformation
InitializeAcl
SetTokenInformation
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
CreatePipe
CreateProcessA
DeleteCriticalSection
DeviceIoControl
DuplicateHandle
EnterCriticalSection
FormatMessageA
FreeLibrary
GetConsoleMode
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentVariableW
GetFileAttributesA
GetFileAttributesExA
GetLastError
GetModuleHandleExA
GetProcAddress
GetShortPathNameA
GetStartupInfoA
GetStdHandle
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryExA
LocalAlloc
LocalFree
MoveFileExA
MultiByteToWideChar
ReadFile
RemoveDirectoryA
SetConsoleCtrlHandler
SetConsoleMode
SetEnvironmentVariableA
SetUnhandledExceptionFilter
Sleep
SleepEx
TerminateThread
TlsAlloc
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__argv
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_assert
_beginthreadex
_cexit
_close
_close
_commit
_commode
_dup
_endthreadex
_errno
_fdopen
_fdopen
_filelengthi64
_fileno
_findclose
_fileno
_findfirst64
_findnext64
_fmode
_fullpath
_get_osfhandle
_getcwd
_initterm
_isatty
_localtime64
_mktime64
_onexit
_mkdir
_open_osfhandle
_pclose
_putenv
_setmode
_stat64
_strdup
_tempnam
_time64
_unlink
_umask
abort
atoi
calloc
exit
fclose
feof
ferror
fflush
fgetc
fgetpos
fgets
fprintf
fputc
fputs
fread
free
fsetpos
fwrite
getc
getenv
isalpha
islower
isspace
isupper
isxdigit
_write
localeconv
malloc
memcmp
memcpy
memmove
memset
puts
realloc
setlocale
setvbuf
signal
strcat
strchr
strcmp
strcpy
strcspn
strerror
strftime
strlen
strncmp
strncpy
strrchr
strspn
strstr
strtok
strtol
strtoul
tolower
toupper
ungetc
vfprintf
wcslen
ws2_32
WSAGetLastError
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
getsockname
listen
recv
select
send
socket
zlib1
deflate
deflateEnd
deflateInit_
gzclose
gzdopen
gzeof
gzerror
gzgetc
gzgets
gzopen
gzread
gzwrite
inflate
inflateEnd
inflateInit_
Sections
.text Size: 394KB - Virtual size: 393KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 440B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/4 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/92 Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ