Behavioral task
behavioral1
Sample
3756-230-0x00000000000A0000-0x0000000000D1D000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3756-230-0x00000000000A0000-0x0000000000D1D000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
3756-230-0x00000000000A0000-0x0000000000D1D000-memory.dmp
-
Size
12.5MB
-
MD5
3f00455eba3c3c36e947c003758d2f6a
-
SHA1
9775d05f36e2d720e7e84d82da2e07e9bc7e64f2
-
SHA256
2cfcd31e147f267df4154062e2170d8a6265ffa0c69044627c63f51c46180979
-
SHA512
b384df7b19a8f16e054928b0a06b76350da9920f7a4ec1c9b894b8460540c9c4d58726d47c9b2b04d4e3d4323f07760fb89c8e3024f500671265a932652dcb5f
-
SSDEEP
393216:Z/IsTvZ7L76NQy8SVDBOrHRmgTEa7RTjT:1ZTvViH8SVDORjf
Malware Config
Signatures
-
Privateloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3756-230-0x00000000000A0000-0x0000000000D1D000-memory.dmp
Files
-
3756-230-0x00000000000A0000-0x0000000000D1D000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp#@@4 Size: - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp#@@4 Size: 6.2MB - Virtual size: 6.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ