Behavioral task
behavioral1
Sample
0cdd9cd133555f23cc30876c7ef36cca43834f4d6172a161436238cdc80c9e17.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cdd9cd133555f23cc30876c7ef36cca43834f4d6172a161436238cdc80c9e17.exe
Resource
win10v2004-20231222-en
General
-
Target
0b9fb73dafac9f78b67e62b4a33c168a.bin
-
Size
1.1MB
-
MD5
0141da3b556dbacea3d36f9fd2e93218
-
SHA1
abb6f3b7ea144e3cb23a7a24e7952f59dae70b73
-
SHA256
fa12953b36a35b8cb4027ca19240f39f605d0a3c745c8cdcd130b2fa305cf0a1
-
SHA512
a6aaa1a170cc08306473e4ea319188986e1813f96810b198bd3570eced8c220293e73e039c6d64ec0f38dc262233435c44a09c93fde29d317094c9fa52881321
-
SSDEEP
24576:LKJc77LTfmDQoGMB4ZBS12uiicoIj6kH0bjaiSk7d3y0/HE+u:LWeHTflo54a297oSDH0bjaitd3ZHu
Malware Config
Signatures
-
resource yara_rule static1/unpack001/0cdd9cd133555f23cc30876c7ef36cca43834f4d6172a161436238cdc80c9e17.exe dcrat -
Dcrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0cdd9cd133555f23cc30876c7ef36cca43834f4d6172a161436238cdc80c9e17.exe
Files
-
0b9fb73dafac9f78b67e62b4a33c168a.bin.zip
Password: infected
-
0cdd9cd133555f23cc30876c7ef36cca43834f4d6172a161436238cdc80c9e17.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ