Behavioral task
behavioral1
Sample
c5e665455c73297aa1a1836f1485b6d604a39bc769fe17692f7c2dfafb2aa7ed.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c5e665455c73297aa1a1836f1485b6d604a39bc769fe17692f7c2dfafb2aa7ed.exe
Resource
win10v2004-20230703-en
General
-
Target
c5e665455c73297aa1a1836f1485b6d604a39bc769fe17692f7c2dfafb2aa7ed
-
Size
9.5MB
-
MD5
cd15c307360aefc1e834e7aed129bdc9
-
SHA1
ba9e4b4a03c81391d35f1aacf1b351d9f31b698d
-
SHA256
c5e665455c73297aa1a1836f1485b6d604a39bc769fe17692f7c2dfafb2aa7ed
-
SHA512
062c22683da44c0afc6f57ea86a4d8ecc87c5571133afccb40151aed92b47dc2483970cd1ea9119ab832c2d67b73eb865a8d14b05f10e82d7f873c76a2fa7246
-
SSDEEP
196608:0AFjb5AUNpRl/0i9C8uMwWjYAHj03WQDZK/651P8pLKmm:0A+hGCgwWjtHj/oK/6QKm
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c5e665455c73297aa1a1836f1485b6d604a39bc769fe17692f7c2dfafb2aa7ed
Files
-
c5e665455c73297aa1a1836f1485b6d604a39bc769fe17692f7c2dfafb2aa7ed.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 596KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 2.1MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 36KB - Virtual size: 498KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 220KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 9.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 6.4MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ