Static task
static1
Behavioral task
behavioral1
Sample
BindShell.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
BindShell.exe
Resource
win10v2004-20230915-en
General
-
Target
BindShell.exe
-
Size
24KB
-
MD5
a285b8bf251c7385bbe6ec7de91b8b6d
-
SHA1
da35e993ca6b2f8a73bef404a32391ae2a6f6b3e
-
SHA256
f8a603588cb91acf4c4a745f74326d202f4d63243fefaf048e1076174a18a50a
-
SHA512
eee893c34dd8ef659fb69de9564c42a74a3978037dca508dd187a19ebaa5d1a07e12bc4eb73c7870fa2151732423e2f31aad542039c7b0e4bd84f3bba5e3d16e
-
SSDEEP
384:f0av7ODM08MXckYdK27UW/xMjI0vnBXDST2J:f0av70bYdKk0bSC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource BindShell.exe
Files
-
BindShell.exe.exe windows:4 windows x86
5552ab2daeb87de1d64ec3d73582bb5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
wsock32
WSACleanup
WSAStartup
accept
bind
htons
listen
recv
send
socket
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
kernel32
AddAtomA
CreatePipe
CreateProcessA
ExitProcess
FindAtomA
GetAtomNameA
GetConsoleTitleA
GetExitCodeProcess
GetStartupInfoA
PeekNamedPipe
ReadFile
SetUnhandledExceptionFilter
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
exit
fflush
fprintf
free
malloc
memset
printf
signal
sprintf
strlen
user32
FindWindowA
ShowWindow
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 176B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE