E:\Выдача билдов Orion\Release\stealer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac833a9ebaec27ea4a0525df24e00ecb.exe
Resource
win7-20240221-en
General
-
Target
ac833a9ebaec27ea4a0525df24e00ecb
-
Size
2.6MB
-
MD5
ac833a9ebaec27ea4a0525df24e00ecb
-
SHA1
526dcd73a7e93cffaf0d4abbf62033adc00b4153
-
SHA256
3193faaadb71010d76dfb126c7cf19e9195147c98efda41169da4df4586a6d78
-
SHA512
dd01f26fc45e4ddedd374b69046fad8ea5011fedd9aa123a44fee5023fae66b3ff6ef4cb33009cfdedfcade05e69a684b7e1252df2d25fef76d39c67deed35c5
-
SSDEEP
49152:5BM/kYOLM+oytNeruCGZVh2f0v65eNY4tPtmCDhD3Y8yUtr49t:5BM/kYf+oONeruCGlk0v6IL3mCV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac833a9ebaec27ea4a0525df24e00ecb
Files
-
ac833a9ebaec27ea4a0525df24e00ecb.exe windows:6 windows x86 arch:x86
b5dbd3b52bdee7d56464c5bf888e88b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
crypt32
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
CertFindExtension
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CryptUnprotectData
CertGetNameStringA
CryptStringToBinaryA
kernel32
HeapDestroy
UnlockFile
GetProcAddress
CreateFileMappingA
LocalFree
LockFileEx
GetFileSize
DeleteCriticalSection
GetCurrentProcessId
SystemTimeToFileTime
FreeLibrary
WideCharToMultiByte
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
InitializeCriticalSectionEx
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryA
GetModuleHandleA
SetLastError
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
GetFileType
HeapCompact
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoA
GetFileSizeEx
GetEnvironmentVariableW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
DeleteFiber
ConvertFiberToThread
FindFirstFileW
FindNextFileW
GetConsoleMode
SetConsoleMode
ReadConsoleA
GetLastError
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapAlloc
LoadLibraryW
GetSystemInfo
HeapReAlloc
DeleteFileW
LoadLibraryA
OutputDebugStringW
GetFileAttributesExW
PeekNamedPipe
GetCurrentDirectoryW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
SetStdHandle
GetConsoleCP
GetCommandLineW
GetCommandLineA
GetModuleFileNameW
SetConsoleCtrlHandler
ExitProcess
WriteConsoleW
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
CreateThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
LoadLibraryExW
RaiseException
RtlUnwind
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
DecodePointer
EncodePointer
SwitchToThread
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetDiskFreeSpaceA
FormatMessageW
GetTempPathA
Sleep
HeapSize
HeapValidate
UnmapViewOfFile
GetFileAttributesW
CreateFileW
WaitForSingleObject
CreateMutexW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
GetFullPathNameW
EnterCriticalSection
HeapFree
HeapCreate
ReadFile
AreFileApisANSI
GetProcessHeap
CloseHandle
DeleteFileA
CreateFileA
CopyFileA
FindClose
FindNextFileA
WriteFile
FindFirstFileA
MultiByteToWideChar
GetFileAttributesA
ReadConsoleW
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetSystemMetrics
ReleaseDC
GetDC
gdi32
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteDC
GetObjectW
DeleteObject
GetCurrentObject
bcrypt
BCryptGenRandom
normaliz
IdnToAscii
ws2_32
freeaddrinfo
getaddrinfo
WSACloseEvent
listen
htonl
accept
select
__WSAFDIsSet
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
closesocket
WSAGetLastError
send
recv
WSACreateEvent
WSAEnumNetworkEvents
WSAEventSelect
recvfrom
sendto
gethostname
ntohl
ioctlsocket
setsockopt
wldap32
ord41
ord50
ord45
ord26
ord211
ord46
ord217
ord143
ord27
ord32
ord33
ord35
ord22
ord79
ord30
ord200
ord301
ord60
advapi32
RegisterEventSourceW
CryptEnumProvidersW
DeregisterEventSource
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptAcquireContextW
ReportEventW
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 486KB - Virtual size: 486KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ