Behavioral task
behavioral1
Sample
1712-54-0x0000000000C50000-0x000000000209A000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1712-54-0x0000000000C50000-0x000000000209A000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1712-54-0x0000000000C50000-0x000000000209A000-memory.dmp
-
Size
20.3MB
-
MD5
ec408e64910c3a728246443c9160e1d2
-
SHA1
012d3046a6d3548c16315e1b18ab8528c3070d84
-
SHA256
4fe909f25a2603d7d06b1a8c05a7a48b8886e722606307d379be2f0214a6a323
-
SHA512
4b4870b299833e328cd4a95b73e48819d35bc01ebd4ce7e5f1aa9db2d248064ea64f50f9284573103b015a1807a7f82ef509b25e348779df5979b50a0e0e1e35
-
SSDEEP
196608:e2h//WPT8Q8jBh6lADEdguh3XKW+Ki1VtRqZS0j+Lai4osI3jhMSNnV5:z/eM90lUEdlXDFiftRqE2QadossBV5
Malware Config
Signatures
-
Privateloader family
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1712-54-0x0000000000C50000-0x000000000209A000-memory.dmp
Files
-
1712-54-0x0000000000C50000-0x000000000209A000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 4.8MB - Virtual size: 4.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 177KB - Virtual size: 12.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ