Behavioral task
behavioral1
Sample
2040-72-0x0000000000980000-0x0000000001680000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2040-72-0x0000000000980000-0x0000000001680000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2040-72-0x0000000000980000-0x0000000001680000-memory.dmp
-
Size
13.0MB
-
MD5
0d9ea89f2c986aea8b61d047d1e1e352
-
SHA1
dae7e86d536ee2acc410e3b4bbae54ce8f4fc300
-
SHA256
ed06c6c41273cf72a334ef6d174588f4e635549c4e169efd29500e9eccd3649f
-
SHA512
8d463ea9506a925763b5642e9d96d386d0b807201d5ccd3864c06a16a163070b39c1f0b7b5928398bfdcca2fa8d8244b85ca295ad1a016501e3089740674c952
-
SSDEEP
393216:C/RuUa4m/g/WYo8uontWYAsm44NePoU/g:qRuf/6Wy/UN
Malware Config
Signatures
-
Privateloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2040-72-0x0000000000980000-0x0000000001680000-memory.dmp
Files
-
2040-72-0x0000000000980000-0x0000000001680000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp$%^0 Size: - Virtual size: 4.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp$%^1 Size: 6.5MB - Virtual size: 6.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 210KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ