Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Vigorf.15933.16772.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Vigorf.15933.16772.exe
Resource
win10v2004-20230220-en
General
-
Target
SecuriteInfo.com.Trojan.Vigorf.15933.16772.exe
-
Size
153KB
-
MD5
4662dfbe036d1018014f69e9886099d2
-
SHA1
d11f8fcac3acb2fbb126938dbd034496273d46d2
-
SHA256
124287a2a5fdbf680e6c9bbf1ebc141880fc1b88b4099fe9026afa72c22d9384
-
SHA512
c977d5d42c35700852474f5a96768bd3256d10065878789d4fc4d4db79247b18490a6023f87acfce5c820c15a957ca80503818919b8beed71cc668d9ad2bb938
-
SSDEEP
3072:jAnlOa5QaMLy1qDjuckP9RWZWJp/CH4zioDAqn7Sbni+AsXOYQRz/:jAnlOa5QaESqCX6HxAsQV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Trojan.Vigorf.15933.16772.exe
Files
-
SecuriteInfo.com.Trojan.Vigorf.15933.16772.exe.exe windows x86
fd2edb8af593caaf43ff8e7f6cace3ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetOpenFileNameA
comctl32
ord17
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
kernel32
GetEnvironmentStrings
lstrcpyA
lstrlenA
GetModuleFileNameA
GetModuleHandleA
lstrcpynA
WriteFile
lstrcatA
GetTempPathA
CloseHandle
ReadFile
GetFileSize
CreateFileA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
lstrcmpA
DeleteFileA
SetFilePointer
SetFileTime
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
GetFileAttributesA
InterlockedDecrement
InitializeCriticalSection
CompareStringA
SetEndOfFile
GetStringTypeW
GetStringTypeA
LoadLibraryA
InterlockedIncrement
SetStdHandle
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
DeleteCriticalSection
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
FlushFileBuffers
GetProcAddress
GetFullPathNameA
WideCharToMultiByte
FileTimeToLocalFileTime
CompareStringW
GetStartupInfoA
FindFirstFileA
IsBadWritePtr
HeapReAlloc
RtlUnwind
GetLastError
SetEnvironmentVariableA
GetCurrentDirectoryA
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
FindClose
FileTimeToSystemTime
VirtualAlloc
GetDriveTypeA
VirtualFree
SetLastError
GetCommandLineA
GetVersion
ExitProcess
TlsSetValue
TlsAlloc
TlsGetValue
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
user32
ShowWindow
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SendMessageA
CreateDialogParamA
CheckDlgButton
GetWindowTextA
wsprintfA
IsDlgButtonChecked
LoadCursorA
SetCursor
GetDesktopWindow
SetFocus
DestroyWindow
PostMessageA
GetActiveWindow
DialogBoxParamA
EnableWindow
LoadStringA
MessageBoxA
SetWindowLongA
EndDialog
GetSystemMetrics
GetWindowRect
MoveWindow
GetDlgItem
SetWindowTextA
advapi32
GetSecurityDescriptorControl
ole32
CoRegisterClassObject
CoInitialize
CoUninitialize
CoRevokeClassObject
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ