Static task
static1
Behavioral task
behavioral1
Sample
KillAVLoader.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
KillAVLoader.exe
Resource
win10v2004-20231215-en
General
-
Target
KillAVLoader.exe
-
Size
222KB
-
MD5
a3fdf6ac70c04d09252abd779d935e20
-
SHA1
2d28d5134aab0010ec98e35cb79a358521de057d
-
SHA256
6ba73af20fe839c1ff63bee84598edd8d40668c4ff70f82f2ab6dfdea8b24548
-
SHA512
9824fd95ae67d8bc49d76bd9980d283efc021a5ea7a454144d7d007b20dd6a6b7cc275b79d61e9c90f2f47366cf2ed5e163d3c08ab442f601430d5f4a3c0862b
-
SSDEEP
3072:cYFcGqzvI/XyQ0inIxaTrydmMv+VeGNCP:cY6NI/dlnIxOy6B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource KillAVLoader.exe
Files
-
KillAVLoader.exe.exe windows:6 windows x64 arch:x64
566e8f2f4fe5b18844790e8be7b182c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WriteProcessMemory
VirtualFree
WriteFile
VirtualAlloc
Thread32Next
CreatePipe
Thread32First
SuspendThread
ResumeThread
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
Process32NextW
OutputDebugStringW
DeleteFileA
Process32FirstW
CloseHandle
GetThreadContext
GetProcAddress
VirtualAllocEx
ExitProcess
VerSetConditionMask
CreateProcessW
GetModuleHandleW
VerifyVersionInfoW
SetThreadContext
OpenThread
lstrlenA
CreateThread
WriteConsoleW
CreateFileW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
GetProcessHeap
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetCurrentProcess
TerminateProcess
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
LCMapStringW
FindClose
user32
UpdateWindow
TranslateMessage
TranslateAcceleratorW
LoadCursorW
LoadIconW
PostQuitMessage
DispatchMessageW
GetMessageW
DefWindowProcW
MessageBoxW
CreateWindowExW
RegisterClassExW
LoadAcceleratorsW
LoadStringW
ShowWindow
shell32
SHGetFolderPathA
ws2_32
htons
recv
connect
socket
send
inet_addr
WSAStartup
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ