@GetSecondVice@0
Static task
static1
Behavioral task
behavioral1
Sample
Dark+Eye.zip-PLND-AIRL9GAhBQUABTwCAEJZFwAoAI2ubeIA.exe
Resource
win7-20231215-en
General
-
Target
f1242e68ef6cc7f4a67ff5af36026bf3.zip
-
Size
4.3MB
-
MD5
f1242e68ef6cc7f4a67ff5af36026bf3
-
SHA1
f886cdadaeb8ac5601fe559e333aeb3de3ad032c
-
SHA256
38d06615463801d5d0af374c31a65204fba876d3b2ac6239a9420cbf893c3c0b
-
SHA512
8c0529f4a6e0495e29dbc279726a6563b37f9f1be28c56c4e7306c44912f90ffea12dd171886b104cebad3f9d1c94f7ddcafd792e0fb395b8079fa3d75f4aac8
-
SSDEEP
98304:8mABcfX3nIonBEA1ock5kjnPv/GhyGWKx5AnLHP2dVw:8VcfX3IouGW5m3wWK8LH+dVw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Dark+Eye.zip-PLND-AIRL9GAhBQUABTwCAEJZFwAoAI2ubeIA.exe
Files
-
f1242e68ef6cc7f4a67ff5af36026bf3.zip.zip
-
Dark+Eye.zip-PLND-AIRL9GAhBQUABTwCAEJZFwAoAI2ubeIA.exe.exe windows:5 windows x86 arch:x86
b3536084cb50b2be3b69aa695eba88f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedPopEntrySList
EnumDateFormatsW
GetConsoleAliasesLengthA
GetTapePosition
GetLongPathNameA
GetUserDefaultLangID
AddRefActCtx
GetCPInfoExA
WriteConsoleInputW
ReadConsoleInputW
GetTapeParameters
WaitCommEvent
GetNumaNodeProcessorMask
GetConsoleCP
VerifyVersionInfoA
WaitNamedPipeW
CreateMutexA
WriteConsoleW
GetLastError
CreateFileA
DeleteFileW
WritePrivateProfileSectionA
GetPrivateProfileSectionW
GetLongPathNameW
SetStdHandle
LoadLibraryW
IsDebuggerPresent
FindFirstVolumeW
WriteFile
BuildCommDCBW
FindActCtxSectionStringW
VerLanguageNameW
SetFileShortNameW
WriteProcessMemory
GetFileAttributesW
OpenEventA
SetEvent
IsBadReadPtr
Sleep
WaitForSingleObject
LoadResource
GetProfileIntA
FreeConsole
SetConsoleCtrlHandler
SetConsoleTitleW
GetCurrentConsoleFont
SetConsoleTextAttribute
AttachConsole
GetConsoleAliasesLengthW
ReadConsoleA
ReadConsoleOutputW
GetSystemWindowsDirectoryW
GetStringTypeW
BuildCommDCBAndTimeoutsA
HeapUnlock
HeapLock
GetAtomNameW
HeapReAlloc
HeapCompact
GetGeoInfoW
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CreateThread
GetVersionExW
GetOEMCP
WaitForMultipleObjects
VerifyVersionInfoW
WriteConsoleOutputCharacterA
LocalAlloc
SetMailslotInfo
GetCPInfoExW
SetEnvironmentVariableW
SetCalendarInfoA
CommConfigDialogA
GetConsoleWindow
FindAtomW
SetFileApisToOEM
GetStringTypeA
HeapSize
GetDiskFreeSpaceA
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
GetStartupInfoA
HeapAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
GetCPInfo
GetACP
IsValidCodePage
RtlUnwind
GetLocaleInfoA
GetConsoleMode
FlushFileBuffers
MultiByteToWideChar
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
CloseHandle
Exports
Exports
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 563KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ