Behavioral task
behavioral1
Sample
5c74843cb825f5d8aa60f23b0f35391e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c74843cb825f5d8aa60f23b0f35391e.exe
Resource
win10v2004-20231215-en
General
-
Target
5c74843cb825f5d8aa60f23b0f35391e
-
Size
2.6MB
-
MD5
5c74843cb825f5d8aa60f23b0f35391e
-
SHA1
ad2468bcf7047e32427d312386ee69781b930440
-
SHA256
b949553f0d1bbd5e903df6a9bea336574819dcf7296c56781fd69ac7f74531df
-
SHA512
b0ee26e2a078d590c9ac4c1dc8bb38f4ab0ad23b600206ced81a933857aa8aaa063e75f3f4d6fd534f270655f1976d6f0becdd6621c5412d9045da62f40dbf1d
-
SSDEEP
49152:NPVKBjJfA+J813XxfgDX6pYatDuRyNWQU4ZmCjQH7DjIPVnPwmb4UEBwtG2CXPnA:NcFJI+J8pZgRcCcEZ4sCs7a3hYvnA
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c74843cb825f5d8aa60f23b0f35391e
Files
-
5c74843cb825f5d8aa60f23b0f35391e.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 57KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 14KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 1KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imports Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.loadcon Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.boot Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ