Static task
static1
Behavioral task
behavioral1
Sample
rust-dotnet-crypter.exe
Resource
win10-20230915-en
General
-
Target
rust-dotnet-crypter.exe
-
Size
277KB
-
MD5
329902972de274bf07ea48e4f055c4c3
-
SHA1
7e329d48000dd4d4418bb3baaed1a8b14bbef4ab
-
SHA256
af493a51a56c04aa08658d3d82cf9ca44aef2ca8762e842ee1c89e97655f1fa2
-
SHA512
373be3464143cf9a1a2ac0ae8b9c6192c23453f12f1db114e11aac1e7faa41fcbb75cba982b9f63be3e3473bf7ebeb41abe802f39c1b90a6ef96893f7cd58966
-
SSDEEP
6144:y9wV1AHIU0xshZmI6vhaSD1IsI3/o2uIGfsqL:NV1AouZh6vUsOnQjfs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource rust-dotnet-crypter.exe
Files
-
rust-dotnet-crypter.exe.exe windows x64
0105f0dfd252c63faf9cc5ae36d3d671
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentThread
HeapFree
GetProcessHeap
HeapAlloc
HeapReAlloc
GetCurrentProcess
CreateFileW
CloseHandle
Sleep
GetLastError
GetModuleHandleA
GetProcAddress
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetStdHandle
GetConsoleMode
SetFilePointerEx
SetThreadStackGuarantee
MultiByteToWideChar
WriteConsoleW
SetLastError
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
ReleaseMutex
RtlLookupFunctionEntry
GetModuleHandleW
FormatMessageW
AcquireSRWLockExclusive
AddVectoredExceptionHandler
ExitProcess
GetCurrentDirectoryW
RtlCaptureContext
GetEnvironmentVariableW
AcquireSRWLockShared
ReleaseSRWLockShared
GetConsoleOutputCP
FlushFileBuffers
WaitForSingleObject
HeapSize
VirtualProtect
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
EncodePointer
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RtlPcToFileHeader
WriteFile
GetModuleFileNameW
TerminateProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetFileType
GetStringTypeW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
psapi
GetModuleBaseNameW
EnumProcessModulesEx
GetModuleFileNameExW
bcrypt
BCryptGenRandom
ntdll
NtWriteFile
RtlNtStatusToDosError
advapi32
SystemFunction036
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ