D:\ssprotect\branches\3.x-dev\src\compiler\dex_vmp\loader\build_windows_x64\loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKD.71714980.29655.28199.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.GenericKD.71714980.29655.28199.dll
Resource
win10v2004-20240226-en
General
-
Target
SecuriteInfo.com.Trojan.GenericKD.71714980.29655.28199.exe
-
Size
1.1MB
-
MD5
15b9496221506f747ea3ba721c844a16
-
SHA1
a2d7aec13e0a7ded07b89333ee6fb0efb0d2c688
-
SHA256
33c089c6f20de6ca3e3c80b81d60f589bf2c91f42485eacff8cfa80e774804ab
-
SHA512
aac0658bb24d1ad75e08149c5c8326a3c25337435c00eacec301f08d44073b8de6197f11671d9ddf75dae0cf899f6bfdce88dc6044f56236a2f16a0496a12767
-
SSDEEP
12288:7of7w1zXMZJPQDoFq80Yx2PLRgKy2vQ6yXR0nEvLLjzBxQuRW6ihUIzalJoXVoTh:Gw1DUL9uuS1ajcVoTbMZK7A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Trojan.GenericKD.71714980.29655.28199.exe
Files
-
SecuriteInfo.com.Trojan.GenericKD.71714980.29655.28199.exe.dll windows:6 windows x64 arch:x64
140d190bd3e195dfea25efb5ac603ea3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
HeapFree
OutputDebugStringW
WriteConsoleW
SetEndOfFile
OutputDebugStringA
MultiByteToWideChar
HeapSize
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
ReadFile
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
RtlUnwind
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
CloseHandle
GetCurrentThread
GetConsoleMode
ReadConsoleW
SetFilePointerEx
HeapReAlloc
SetConsoleCtrlHandler
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
FlushFileBuffers
WriteFile
GetConsoleOutputCP
SetStdHandle
CreateFileW
GetStringTypeW
GetFileSizeEx
Exports
Exports
JNI_OnLoad
JNI_OnUnload
vm_boolean
vm_byte
vm_char
vm_double
vm_float
vm_init
vm_int
vm_long
vm_object
vm_short
vm_str
vm_void
Sections
.text Size: 562KB - Virtual size: 561KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 337B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 374KB - Virtual size: 374KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ