Behavioral task
behavioral1
Sample
3a607ed5bfa1f081891dbc45d1d85f960b26e868738a81fbc2291b9e7912133c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3a607ed5bfa1f081891dbc45d1d85f960b26e868738a81fbc2291b9e7912133c.exe
Resource
win10v2004-20230824-en
General
-
Target
3a607ed5bfa1f081891dbc45d1d85f960b26e868738a81fbc2291b9e7912133c
-
Size
14.2MB
-
MD5
930112a5629f82d3e9e9eddeb5f7aeec
-
SHA1
9cf6218a97e3564f61020047de64057bc33b10fa
-
SHA256
3a607ed5bfa1f081891dbc45d1d85f960b26e868738a81fbc2291b9e7912133c
-
SHA512
8513190f68939ee7a199b3faba59b44d055b60998773ad7cddb934a7257d341a81db462980f1897db5e5d513c27293e2312a44cf7272084084f9e7f4567a2090
-
SSDEEP
393216:jWcAgZDL5T5SDNqswcub6k6IzeANC6PY6IRby:jGgdtT5XswcubCIKhjG
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a607ed5bfa1f081891dbc45d1d85f960b26e868738a81fbc2291b9e7912133c
Files
-
3a607ed5bfa1f081891dbc45d1d85f960b26e868738a81fbc2291b9e7912133c.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 1020KB - Virtual size: 1016KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 112KB - Virtual size: 532KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: 6.6MB - Virtual size: 6.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rsrr Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE