Static task
static1
Behavioral task
behavioral1
Sample
bade1ca2a8a124dab3d18bbc4c4df1f7.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bade1ca2a8a124dab3d18bbc4c4df1f7.zip
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
6da0257a7a8e9ac18781c93d6873efb942f7e631559882a1fd731a6921963a5a.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
6da0257a7a8e9ac18781c93d6873efb942f7e631559882a1fd731a6921963a5a.exe
Resource
win10v2004-20231215-en
General
-
Target
bade1ca2a8a124dab3d18bbc4c4df1f7.bin
-
Size
421KB
-
MD5
455cb12932c16dd6705fab3255f1a00d
-
SHA1
c9a7418ac5296bf3807d8d2ea7ccd807fcad0355
-
SHA256
773f896c147be52dd1146658fbc49be9da027167561d4a9fc0e65d46fe590fb3
-
SHA512
4c7ce527561453c241502177481738d3921cc0a19659d575a8e58dec61d8d793881de746c71ab30c4342c64ec20523965074f4f7df76e67e4eb6dbdded09211b
-
SSDEEP
6144:ZOZlpQWRy6sQT+R2H4hm14kjIn47mgAJJC+SOs+DOjIMXSfuIpW3lkZB0:UZ/QsT+IHymyp46gAvvHsLuWe4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6da0257a7a8e9ac18781c93d6873efb942f7e631559882a1fd731a6921963a5a.exe
Files
-
bade1ca2a8a124dab3d18bbc4c4df1f7.bin.zip .ps1 polyglot
Password: infected
-
6da0257a7a8e9ac18781c93d6873efb942f7e631559882a1fd731a6921963a5a.exe.exe windows:5 windows x86 arch:x86
Password: infected
2cc68961dd8a09287e908343d46b30d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
VirtualAlloc
LoadLibraryA
GetProcAddress
lstrlenW
CreateThread
Sleep
WaitForSingleObject
FreeConsole
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
CreateFileW
RaiseException
RtlUnwind
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetFileType
SetStdHandle
CloseHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
HeapSize
WriteConsoleW
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 654KB - Virtual size: 654KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ