Behavioral task
behavioral1
Sample
e34f8ca7a486b425453e249eb71e79ade8a4bb15a90907099f36b356421d1eed.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e34f8ca7a486b425453e249eb71e79ade8a4bb15a90907099f36b356421d1eed.exe
Resource
win10v2004-20231215-en
General
-
Target
a7afd4096311b29f3a980404012cebc7.bin
-
Size
415KB
-
MD5
334046e6e569b9c645742402281ef267
-
SHA1
330837151399153f37975f4c81b3b1378aa4aaca
-
SHA256
7e4f2243ef8608a55dbc4c6ae150a77199aa96d9c73899b5eefae861b225e1fe
-
SHA512
0ab6d035617b3b738a0284112a169d95e554964d32e919b9866d5973d5f14170de51d705965b4c83d92053d21708d1a139e771bbfdaa9d5efe3860047b50805b
-
SSDEEP
6144:SPqmAqPHO737+MXgJ2WYYFg8rc7RvqPoDjVzzqCz8HwMqluHbeBha0/dESGFc+EW:x8nUgoW7F2NAofUCzekJZIc+EKT
Malware Config
Signatures
-
resource yara_rule static1/unpack001/e34f8ca7a486b425453e249eb71e79ade8a4bb15a90907099f36b356421d1eed.exe dcrat -
Dcrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e34f8ca7a486b425453e249eb71e79ade8a4bb15a90907099f36b356421d1eed.exe
Files
-
a7afd4096311b29f3a980404012cebc7.bin.zip
Password: infected
-
e34f8ca7a486b425453e249eb71e79ade8a4bb15a90907099f36b356421d1eed.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 814KB - Virtual size: 813KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ