Static task
static1
Behavioral task
behavioral1
Sample
fc00bf8337b313d331cc6fa9be8faff6fc1fa60b5f34cd34604614b52e637fd9.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fc00bf8337b313d331cc6fa9be8faff6fc1fa60b5f34cd34604614b52e637fd9.exe
Resource
win10v2004-20240226-en
General
-
Target
fc00bf8337b313d331cc6fa9be8faff6fc1fa60b5f34cd34604614b52e637fd9.exe
-
Size
4.0MB
-
MD5
744cef044b2b3deee682eaf5700c4246
-
SHA1
a00d9d307cb28cc92f5b2f010578dc5a10d3f812
-
SHA256
fc00bf8337b313d331cc6fa9be8faff6fc1fa60b5f34cd34604614b52e637fd9
-
SHA512
789d68f818bc63ad294f11bd5c42d66c78b2949bb4067a6795beaca689d28a3440d56410cb69a11366158eefa5945df407d6d4c245c333a251049709c69399b2
-
SSDEEP
49152:nRKxYGf1A4Zi2M6PSIJofNnTcvvl1YkIILm:nRKuf
Malware Config
Signatures
-
Detects executables Discord URL observed in first stage droppers 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc00bf8337b313d331cc6fa9be8faff6fc1fa60b5f34cd34604614b52e637fd9.exe
Files
-
fc00bf8337b313d331cc6fa9be8faff6fc1fa60b5f34cd34604614b52e637fd9.exe.exe windows:4 windows x64 arch:x64
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ