Static task
static1
Behavioral task
behavioral1
Sample
Keyauth_Fucker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Keyauth_Fucker.exe
Resource
win10v2004-20231215-en
General
-
Target
Keyauth_Fucker.exe
-
Size
6.3MB
-
MD5
52488ffa75ecfa8bab48d98895ff937b
-
SHA1
21672c3c6a2e1ebccff6cb709b0bfa16c58d1fe6
-
SHA256
8eb82fd5de7312b64eb8486711fab55eb20c4dad6ccc9b826ac6f78dd3209209
-
SHA512
470617f1de29f3e46375e2b5cf24378389f269d894dcab33d8c71283bd41f61cf7a3bafb127fb2317b903fe37bf1b31b1954b206328b2c253d3592535422f0eb
-
SSDEEP
98304:cFp9I/rfiOlb3LfSDXO/6Gf/5oEHQIsWyYUuhW317BB8r2S/NFbj:2pMfiOxLaD+FdrxW3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Keyauth_Fucker.exe
Files
-
Keyauth_Fucker.exe.exe windows:6 windows x64 arch:x64
2d8d13cbaab10bcbc3b28a2b44a76896
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetLastError
GetVersion
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
msvcp140
??1_Lockit@std@@QEAA@XZ
normaliz
IdnToAscii
wldap32
ord46
crypt32
CertFindCertificateInStore
ws2_32
recv
rpcrt4
UuidCreate
psapi
GetModuleInformation
ntdll
RtlCaptureContext
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_destroy
api-ms-win-crt-runtime-l1-1-0
_beginthreadex
api-ms-win-crt-stdio-l1-1-0
_read
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
api-ms-win-crt-heap-l1-1-0
calloc
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-math-l1-1-0
_dclass
api-ms-win-crt-string-l1-1-0
strncmp
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-utility-l1-1-0
qsort
user32
MessageBoxA
CharUpperBuffW
advapi32
InitializeAcl
shell32
ShellExecuteA
Sections
.text Size: - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rW- Size: - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.)$_ Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.I|I Size: 6.3MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ