Behavioral task
behavioral1
Sample
41763cebc3e6fbf62fc219acba5455f25dcaa55818e8936ae781175f0b5a4c9b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
41763cebc3e6fbf62fc219acba5455f25dcaa55818e8936ae781175f0b5a4c9b.exe
Resource
win10v2004-20231222-en
General
-
Target
13a49d9d582d10c95b0047f8823fc6e0.bin
-
Size
1.1MB
-
MD5
f9b3cd7d0b89de6f0cf8fd3426e40fde
-
SHA1
38fc0eb87e26329672565052b14dab403520d0c1
-
SHA256
fbb8180df3d88833980dc7bd381d0b557bd2ee3326c24f206d285ba04b45bcbe
-
SHA512
9fb2f40f36c6219c818161d2a598372e85c82557ff3232c91d002c0d962ecd26b62df0fff2cb19372775023fe705a42311a1995cf8dec7d24c5a6155bc36aff5
-
SSDEEP
24576:WAZ+lFTZzsv9uZDjyqgDuFR7OnRAmetX0lu+iNNB2/RmhhaZIpIg:dYZzs1GDjyqZRUAxilvsI/Rmn1Ig
Malware Config
Signatures
-
resource yara_rule static1/unpack001/41763cebc3e6fbf62fc219acba5455f25dcaa55818e8936ae781175f0b5a4c9b.exe dcrat -
Dcrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/41763cebc3e6fbf62fc219acba5455f25dcaa55818e8936ae781175f0b5a4c9b.exe
Files
-
13a49d9d582d10c95b0047f8823fc6e0.bin.zip
Password: infected
-
41763cebc3e6fbf62fc219acba5455f25dcaa55818e8936ae781175f0b5a4c9b.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ