Behavioral task
behavioral1
Sample
d41a16954307c74c4f43df0c6c42d590.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d41a16954307c74c4f43df0c6c42d590.exe
Resource
win10v2004-20231222-en
General
-
Target
d41a16954307c74c4f43df0c6c42d590
-
Size
6.7MB
-
MD5
d41a16954307c74c4f43df0c6c42d590
-
SHA1
fc2a6d9c051243b98269b99f5686e785b134e8a2
-
SHA256
567889d09bac7f8f17ba5acfa2941ee11ef2961025013816f6f78a4903c3f100
-
SHA512
ffc803fa93743b21b8db59745a6b4062401b3c114dc53cdec821dfc9b677deb0c23c9c346764cdebf85794bb46ad21a6c105586cbcdaf7ea3512593178021dd9
-
SSDEEP
196608:NpPmCsXDjDyf6L2WliXYrHW1f/T2vHgh:/PmCEDVL2ciIrHWp/T2vA
Malware Config
Signatures
-
Detects Pyinstaller 1 IoCs
resource yara_rule sample pyinstaller -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d41a16954307c74c4f43df0c6c42d590
Files
-
d41a16954307c74c4f43df0c6c42d590.exe windows:5 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
reverse_backdoor.pyc