Behavioral task
behavioral1
Sample
2208-57-0x0000000000400000-0x0000000000E33000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2208-57-0x0000000000400000-0x0000000000E33000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2208-57-0x0000000000400000-0x0000000000E33000-memory.dmp
-
Size
10.2MB
-
MD5
61c5be6fd74932b3e0de640a7963d515
-
SHA1
d34dff852b07c14b5cc9fd6fe70f98683b2aa307
-
SHA256
b09488d97e63d3341c41220c70bd7509ac3b0e5ed18d029114641ba110f6c23c
-
SHA512
062f3b4fa030cc8279a1e0d2907ff8e034951341a64f7cae4f07596b78ff20f35ec367f669d1d9343273b8a2c03e1d50870462fe662b6336b1383f6de1790430
-
SSDEEP
196608:AV/NUkH3WDQfLzAQVSaqd+qQ4FCT72CG+ldWeAdfaK3AV5wBm28q8MJwLtk3oahb:0/dmEL5KCOCB6dwoYKBhPJ8OF/+E+g
Malware Config
Signatures
-
Privateloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2208-57-0x0000000000400000-0x0000000000E33000-memory.dmp
Files
-
2208-57-0x0000000000400000-0x0000000000E33000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 820KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text0 Size: - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text2 Size: 6.1MB - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ