Static task
static1
Behavioral task
behavioral1
Sample
CRACK/Keytro.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
CRACK/Keytro.exe
Resource
win10v2004-20231215-en
General
-
Target
7613aa1613b27d63af687c11bba28558
-
Size
3.5MB
-
MD5
7613aa1613b27d63af687c11bba28558
-
SHA1
80c1c26f829d0cd4c9cea1275e1d52c20dffeee8
-
SHA256
7318057b455c3d4cf49befd781733172a994c09c8bcdbb64a53084d997fbd60c
-
SHA512
428b002b23218966e322a5bcdbf981e90c0518d8afd04a3d6ceb52e87a18b76227c8baf5f7aa66e6f82ed95877703ec06813f2aa8163abaa3ff13f28a3034544
-
SSDEEP
49152:wXyF05+Jp0NqE3um6kaxLe4HIxWvR6Jbn5cpc/FKfrdg1z/fMzdQvoq99OxQcIuQ:pHE+BtboxwAO2/F4gTvoq9AiuiAvrVNU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/CRACK/Keytro.exe
Files
-
7613aa1613b27d63af687c11bba28558.rar
-
CRACK/Keytro.exe.exe windows:5 windows x86 arch:x86
e02e71b0b16aef282ea1d5b77d2f1784
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
opengl32
glPolygonMode
glu32
gluOrtho2D
rpcrt4
UuidCreateSequential
crypt32
CryptProtectData
kernel32
LoadLibraryA
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
DispatchMessageA
gdi32
SetPixelFormat
advapi32
RegCloseKey
winmm
waveOutPrepareHeader
Sections
.text Size: - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
19110 Size: - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
19111 Size: 559KB - Virtual size: 558KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE