Static task
static1
Behavioral task
behavioral1
Sample
NetRipper.x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
NetRipper.x64.exe
Resource
win10v2004-20230220-en
General
-
Target
NetRipper.x64.exe
-
Size
282KB
-
MD5
ad93da50953213b977be5bc25da7d6ce
-
SHA1
9cbceff7accdc92cc35ee80e7a19559c05ef5864
-
SHA256
32201855814f2d6df4a5803a8eb182fe10e401da90fdbf67c2318c523b4fd619
-
SHA512
2290e26d41a2470c9b7c059c0883c6a4d6429a2ab15ae075570a187323acd436cebcc7af908b7501f5efaa24aa1360370df28e94efa1350a0f6e97db111e3384
-
SSDEEP
3072:BkCsCJ/BXyE1f2gLaCjvKg99kNuMmqJ9VfjibqKtuzA62BEgPVnoY462qryqxJnR:CCZBiEFfvvKgrkNudCfcPJVohmrPL1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NetRipper.x64.exe
Files
-
NetRipper.x64.exe.exe windows x64
dee5a0f7db72ff83708bc0aba68255ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateRemoteThread
ReadFile
Process32First
HeapFree
GetCurrentProcess
WaitForSingleObject
GetCurrentDirectoryA
VirtualAllocEx
OpenProcess
CreateToolhelp32Snapshot
CreateFileA
Process32Next
CloseHandle
HeapAlloc
GetProcAddress
GetFileSize
GetProcessHeap
WriteConsoleW
VirtualProtectEx
GetModuleHandleA
WriteProcessMemory
SetEndOfFile
HeapSize
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetLastError
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
RaiseException
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetConsoleCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
FlushFileBuffers
ReadConsoleW
HeapReAlloc
CreateFileW
RtlUnwind
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shlwapi
PathIsRelativeA
Sections
.text Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ