Static task
static1
Behavioral task
behavioral1
Sample
rust-dotnet-crypter.exe
Resource
win10-20230703-en
General
-
Target
rust-dotnet-crypter.exe
-
Size
186KB
-
MD5
1e8e49e23cc582c89511c23e0abe91dc
-
SHA1
166716a58732a3d6f936d33404d00487381b144c
-
SHA256
5db217a08702767e394799a05dcd73de5e75ed364661a4c5c29f014eb9f8f059
-
SHA512
64b5f9c627de546d04b00da265d7d286d5e4f69188b7f28c8e7265df2d7dd9d20facde0ad6e5a4c18ed0f357803882fd96e4769e1da18558fb1b2030937f7f54
-
SSDEEP
3072:RWL8pWIhSHuDg9Qmo8+oBBcNdpn/mTTWYWsFCFyXUvXoFQ7yKzrM4:9UIhVTTucNfn/8CYWGbDXKzV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource rust-dotnet-crypter.exe
Files
-
rust-dotnet-crypter.exe.exe windows x64
7a9cf76718b767ffb7fa2343ec67fcbb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
oleaut32
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetLBound
SafeArrayCreateVector
SysStringLen
SysAllocStringLen
SysFreeString
GetErrorInfo
SafeArrayPutElement
SafeArrayGetUBound
kernel32
LoadLibraryA
GetProcAddress
GetConsoleOutputCP
HeapSize
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
FormatMessageW
GetProcessHeap
HeapAlloc
HeapFree
FreeLibrary
GetLastError
WaitForSingleObject
CloseHandle
GetModuleHandleA
GetStdHandle
GetConsoleMode
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
SetLastError
QueryPerformanceCounter
GetCurrentProcess
GetCurrentThread
RtlCaptureContext
RtlLookupFunctionEntry
GetStringTypeW
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
RtlPcToFileHeader
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
AddVectoredExceptionHandler
SetThreadStackGuarantee
RaiseException
GetCurrentProcessId
TryAcquireSRWLockExclusive
HeapReAlloc
GetCommandLineW
GetSystemTimeAsFileTime
EncodePointer
LoadLibraryExW
TlsFree
GetModuleFileNameW
GetEnvironmentStringsW
SetEnvironmentVariableW
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetFileType
FlushFileBuffers
SetFilePointerEx
TerminateProcess
FreeEnvironmentStringsW
GetModuleHandleW
ExitProcess
FindNextFileW
FindClose
CreateFileW
RtlUnwindEx
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
InitializeSListHead
GetCurrentThreadId
ntdll
RtlNtStatusToDosError
NtWriteFile
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ