Behavioral task
behavioral1
Sample
203c02e4d2a59f7524ae2522d0421dd2ad214d061cdac9a80abf928312a85d23.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
203c02e4d2a59f7524ae2522d0421dd2ad214d061cdac9a80abf928312a85d23.exe
Resource
win10v2004-20231023-en
General
-
Target
203c02e4d2a59f7524ae2522d0421dd2ad214d061cdac9a80abf928312a85d23
-
Size
7.0MB
-
MD5
6d08702e967dce370c564ad27c976719
-
SHA1
7f026e7266aadbbb819785e49443197734484927
-
SHA256
203c02e4d2a59f7524ae2522d0421dd2ad214d061cdac9a80abf928312a85d23
-
SHA512
3548e634021b364bf7f8c2119f806541fa404678156b6353f026d2d9d8ee22bb08d83cc32f23b428b03a23f26608be2091ae79ead24dc2eb6dc0d9f671fa2936
-
SSDEEP
196608:L4VcfSljiIMCstvX0bziJhSnStsPp5a/SNivEeV:8VKS1fUkmrHYviSNuEeV
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 203c02e4d2a59f7524ae2522d0421dd2ad214d061cdac9a80abf928312a85d23
Files
-
203c02e4d2a59f7524ae2522d0421dd2ad214d061cdac9a80abf928312a85d23.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 1.2MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 2.8MB - Virtual size: 5.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 88KB - Virtual size: 717KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 188KB - Virtual size: 372KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 376KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ