Behavioral task
behavioral1
Sample
904-55-0x00000000000B0000-0x0000000000475000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
904-55-0x00000000000B0000-0x0000000000475000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
904-55-0x00000000000B0000-0x0000000000475000-memory.dmp
-
Size
3.8MB
-
MD5
cdfc521890258c1f052401900d8488b2
-
SHA1
8f85c1cc6c29f82061c644555defb1ceedceadb3
-
SHA256
9dd402e2a3351bb2151230ef9066c16c2c124e83e7a44afade63864731780ef8
-
SHA512
aa5fc7407a70c6e01e5623c270a8cf2187b81f5bac740c4320ea7654d4bc8a86d9d49a349d9e923a75cc37435a5fe2ed0e7335b22bffc5345060cf08d8c36c58
-
SSDEEP
49152:TjXdece/049+eS6VOGX5f3jpePSdludHU1yxUx0+2DDJEb:H4ce/043S6V9XB3jpePSd0BbUx0+2D9q
Malware Config
Signatures
-
Privateloader family
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 904-55-0x00000000000B0000-0x0000000000475000-memory.dmp
Files
-
904-55-0x00000000000B0000-0x0000000000475000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 120KB - Virtual size: 325KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 13KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 258KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE