Behavioral task
behavioral1
Sample
8d719797d54ade99d81bc37270540ae77d665a7a11322fbd7cc6821033ee55f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d719797d54ade99d81bc37270540ae77d665a7a11322fbd7cc6821033ee55f5.exe
Resource
win10v2004-20231215-en
General
-
Target
c01e344b3afbf8c809d7772b4087446b.bin
-
Size
1.1MB
-
MD5
266364e4c8db8b01430c6b989dd2788e
-
SHA1
d1be93e41271c5babf2195c0f30ea6c139f49c23
-
SHA256
00e3b7658c0f0f1db61c8f3d3125cc2f75faf5bf0af5100b5a210b04495b7380
-
SHA512
9e61e48e814fa2e43220bc6e8d4bfc20004885624a6168c3b65edb4f1f300d9ee59f2f786f17d8fccbacf27e7d63592ec049b0a5a049aec9ed5bfe59d321218a
-
SSDEEP
24576:iNF3Oa+xVYM86LNUkFAbGtuXbp/eocpVWcm1CPuaPZQeEzJwQD+MQnu8R:iNF3UVh8SF2Cyco+WNfaqeEzJ1D+3
Malware Config
Signatures
-
resource yara_rule static1/unpack001/8d719797d54ade99d81bc37270540ae77d665a7a11322fbd7cc6821033ee55f5.exe dcrat -
Dcrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/8d719797d54ade99d81bc37270540ae77d665a7a11322fbd7cc6821033ee55f5.exe
Files
-
c01e344b3afbf8c809d7772b4087446b.bin.zip
Password: infected
-
8d719797d54ade99d81bc37270540ae77d665a7a11322fbd7cc6821033ee55f5.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ