Behavioral task
behavioral1
Sample
ed19a4518355ea8203b8d6bb6e1dcf2487add69929cf0272c8027a3186fbf777.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
ed19a4518355ea8203b8d6bb6e1dcf2487add69929cf0272c8027a3186fbf777.exe
Resource
win10v2004-20231023-en
General
-
Target
ed19a4518355ea8203b8d6bb6e1dcf2487add69929cf0272c8027a3186fbf777.zip
-
Size
415KB
-
MD5
bca351f21fb07a51915f65a98b229d66
-
SHA1
adbfd4f07d90a3a387474b9fbdfd5d9d283e58da
-
SHA256
c4df918ebe1b4232eef4c9b8b7779acf095b1965afdbac2cde9c4403216edbe2
-
SHA512
666db9e6a2c44f49b7b0da0970e7e0a491ce854048e246e83d03d49ab4f030b4886b5f3ea7632dca59ebf0aad3ec5d0fc6c9c997a3e747760c01be75db64e470
-
SSDEEP
12288:pBudZXQKe+IhnR0j4V6SY0DgZgPBYZHAcW:siKeVhnKjbScgcW
Malware Config
Signatures
-
resource yara_rule static1/unpack001/ed19a4518355ea8203b8d6bb6e1dcf2487add69929cf0272c8027a3186fbf777.exe dcrat -
Dcrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ed19a4518355ea8203b8d6bb6e1dcf2487add69929cf0272c8027a3186fbf777.exe
Files
-
ed19a4518355ea8203b8d6bb6e1dcf2487add69929cf0272c8027a3186fbf777.zip.zip
Password: infected
-
ed19a4518355ea8203b8d6bb6e1dcf2487add69929cf0272c8027a3186fbf777.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 814KB - Virtual size: 813KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ