Behavioral task
behavioral1
Sample
59bce6c5d9a605d66244266ef768a7b6128f63e2407de6140bfff8976bdbedc3.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
59bce6c5d9a605d66244266ef768a7b6128f63e2407de6140bfff8976bdbedc3.exe
Resource
win10v2004-20230703-en
General
-
Target
59bce6c5d9a605d66244266ef768a7b6128f63e2407de6140bfff8976bdbedc3
-
Size
4.8MB
-
MD5
2fa571bf0268ca6d75023db5a935b9a5
-
SHA1
c312a313436bc31be0ba1e4f169a65b578770be9
-
SHA256
59bce6c5d9a605d66244266ef768a7b6128f63e2407de6140bfff8976bdbedc3
-
SHA512
4ef9eb92bef9d40c5be59eb1b8a59847cd45f0df7706c26fdb8594d79b52b969cfc60bc7d0a89ecb193bf8c1df3992761509cde862a14b9d677119e8b0c1f7b5
-
SSDEEP
98304:NZDELMLHi4asNNwg9oJk6vkH2lI5oI6gOi7z181xOhHvAWM+NJNJE:HqNsNNwgEkKkDn10AHvTvNJ
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59bce6c5d9a605d66244266ef768a7b6128f63e2407de6140bfff8976bdbedc3
Files
-
59bce6c5d9a605d66244266ef768a7b6128f63e2407de6140bfff8976bdbedc3.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 416KB - Virtual size: 811KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 500KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 32KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 5.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ