Static task
static1
General
-
Target
rust-dotnet-crypter.exe
-
Size
643KB
-
MD5
6511ada00acf160609aaf819867c23bb
-
SHA1
53ce743b2994e021347fab16fc883f3bd0da8195
-
SHA256
69a4d194bc1a75ae05c27ed8cfb2437973f5a1622876bbbd7fbfa96f56002cf3
-
SHA512
f8632f13160b8de787089661dd1c0718e5ee8f000b0806f7cfa7a67908b671794deec1a960ee57bba3f800db1a508b6da2ae47d859be8a633bec90bad80ed61e
-
SSDEEP
12288:DLhXfP81XAo6iqr7QtwjupqUTzOhVmqKsU8Pas5nz0E0PIjPG:DLhvP81QhiLMupqUwvrUmpz0tPl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource rust-dotnet-crypter.exe
Files
-
rust-dotnet-crypter.exe.exe windows:6 windows x64
847c2f25b48889c8545823bcf35ae6ba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
kernel32
CreateFileW
RtlVirtualUnwind
Sleep
LoadLibraryA
GetProcAddress
VirtualProtect
GetProcessHeap
HeapAlloc
HeapFree
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetLastError
GetCurrentThread
HeapReAlloc
GetCurrentProcess
CloseHandle
GetModuleHandleA
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetStdHandle
GetConsoleMode
WaitForSingleObject
MultiByteToWideChar
WriteConsoleW
SetLastError
WaitForSingleObjectEx
CreateMutexA
ReleaseMutex
RtlLookupFunctionEntry
GetModuleHandleW
FormatMessageW
GetCurrentDirectoryW
RtlCaptureContext
AcquireSRWLockExclusive
GetEnvironmentVariableW
AcquireSRWLockShared
ReleaseSRWLockShared
FreeLibrary
SetFilePointerEx
GetConsoleOutputCP
FlushFileBuffers
HeapSize
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
EncodePointer
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RtlPcToFileHeader
WriteFile
GetModuleFileNameW
ExitProcess
TerminateProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetFileType
GetStringTypeW
psapi
GetModuleFileNameExW
GetModuleBaseNameW
EnumProcessModulesEx
oleaut32
SafeArrayCreateVector
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SysStringLen
SafeArrayPutElement
SafeArrayGetUBound
SafeArrayGetLBound
GetErrorInfo
SysFreeString
ntdll
NtWriteFile
RtlNtStatusToDosError
Sections
.text Size: 219KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 407KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ