Static task
static1
Behavioral task
behavioral1
Sample
loader_crackedrusta.vmp.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
loader_crackedrusta.vmp.exe
Resource
win10v2004-20231215-en
General
-
Target
loader_crackedrusta.vmp.exe
-
Size
6.6MB
-
MD5
691e6eeb069a6ef6a9d2ca06a877b1b6
-
SHA1
2e115fddd8532d25b1bb176c0fe6c482cc8b8691
-
SHA256
05a46eb9eb63b5db08c44ee2808bdf4d7d0174c87d52ae609effc6bf02c96471
-
SHA512
b323962f403746d256c5bed27a65c09d56d6290ee026f4693e26bd4a8b32c00eefc619940f440e2cb8149a055e296687d890ed8dd7ef93e3a59aeb758fb64c79
-
SSDEEP
196608:Vfg/8JJgZmxIgRiXfnk7QLkNWofYEHsCkvli1ozzyMjunT+l:VfbO7gIvuNRiCk9i1ozgnT+l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource loader_crackedrusta.vmp.exe
Files
-
loader_crackedrusta.vmp.exe.exe windows:6 windows x64 arch:x64
1497f9c33fd10e425104ca80a711f486
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemDirectoryA
GetVersion
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetClientRect
CharUpperBuffW
advapi32
FreeSid
imm32
ImmSetCompositionWindow
msvcp140
?always_noconv@codecvt_base@std@@QEBA_NXZ
ntdll
NtRaiseHardError
urlmon
URLDownloadToFileA
d3d9
Direct3DCreate9
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
api-ms-win-crt-stdio-l1-1-0
_wfopen
api-ms-win-crt-string-l1-1-0
isprint
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-heap-l1-1-0
_set_new_mode
api-ms-win-crt-convert-l1-1-0
strtoul
api-ms-win-crt-time-l1-1-0
strftime
api-ms-win-crt-runtime-l1-1-0
_beginthreadex
api-ms-win-crt-filesystem-l1-1-0
_stat64
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-math-l1-1-0
sqrtf
ws2_32
recvfrom
wldap32
ord79
crypt32
CryptDecodeObjectEx
normaliz
IdnToAscii
shell32
ShellExecuteA
Sections
.text Size: - Virtual size: 576KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 800KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.|/@ Size: - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Zc_ Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qE\ Size: 6.6MB - Virtual size: 6.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ