Behavioral task
behavioral1
Sample
b4d092bdd58610ec77ef6713fe7559c39a52f77d37f8a3c5044e1b95e98f969e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b4d092bdd58610ec77ef6713fe7559c39a52f77d37f8a3c5044e1b95e98f969e.exe
Resource
win10v2004-20230703-en
General
-
Target
8c9c29e59baf663d0b071b9efdec3bea.bin
-
Size
137KB
-
MD5
31319767a6e0d8ac03b7b21f592817c6
-
SHA1
fab5cbad19c11029431a3450043bc567e406970f
-
SHA256
565a2849bb4f871c9b4da984ebddfb8ecc29f8f74806c551d803101b8c42c652
-
SHA512
b7f2fada2a9b6405a066844e37be379622096cc14a2e7b0e7ea7af032629c914bea817a68634f7ddd5ac06a7e0894c765a16016f519765049d8890ad8845eaa7
-
SSDEEP
3072:YYaIHJ9TyxghlhU78KTfUeM5SeeijDgdH0wq3TbiKHjLSuDPb6eoWlC4mW/1:JdJygeXrfeLjcdUw2T7XRbR44mW/1
Malware Config
Signatures
-
Vanilla Rat payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/b4d092bdd58610ec77ef6713fe7559c39a52f77d37f8a3c5044e1b95e98f969e.exe vanillarat -
Vanillarat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/b4d092bdd58610ec77ef6713fe7559c39a52f77d37f8a3c5044e1b95e98f969e.exe
Files
-
8c9c29e59baf663d0b071b9efdec3bea.bin.zip
Password: infected
-
b4d092bdd58610ec77ef6713fe7559c39a52f77d37f8a3c5044e1b95e98f969e.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 185B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ