c:\0bulknet\Replacer\MailSpectre\Release\MailSpectre.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d4231918bd8752e072a21a3c9131f032.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4231918bd8752e072a21a3c9131f032.exe
Resource
win10v2004-20240226-en
General
-
Target
d4231918bd8752e072a21a3c9131f032
-
Size
92KB
-
MD5
d4231918bd8752e072a21a3c9131f032
-
SHA1
f798dae726c43baf3af773b9a29dadf8b4a1a501
-
SHA256
0913d5591f0094a61a666139ff8d5184ae2572da8592223dec9dfbadd9ff66cc
-
SHA512
685044b7dbeed4a5b5e571fa34aeac43ef7658895fc3032a79dd5330db830a5fc85cebb2f9195e75dd5758cb35c729cb53625155ede3ae4d12727a196bce4b86
-
SSDEEP
1536:qJ16X73eU2okgnFVd9flqiAWEfOs4v8/ShZd/+X84fNyAOPv9hdxKkWRxlnES:qJgXFXqi7EW9hZdiFMnPKkWRxlnES
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4231918bd8752e072a21a3c9131f032
Files
-
d4231918bd8752e072a21a3c9131f032.exe windows:4 windows x86 arch:x86
57e33902e3a232b931edc6f0653e217e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
wnsprintfA
StrStrA
gdiplus
GdipCloneImage
GdipCloneBrush
GdipCloneBitmapAreaI
GdipDeletePrivateFontCollection
GdipGetFontCollectionFamilyList
GdipCloneFontFamily
GdipDrawImageI
GdipDrawString
GdipFillRectangleI
GdipDrawLineI
GdipReleaseDC
GdipGetDC
GdipGetImageGraphicsContext
GdipCreateSolidFill
GdiplusShutdown
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipCreateBitmapFromScan0
GdipGetImageHeight
GdipGetImageWidth
GdipSaveImageToStream
GdipDisposeImage
GdipLoadImageFromStream
GdipDeleteFont
GdipPrivateAddMemoryFont
GdipNewPrivateFontCollection
GdipGetFontCollectionFamilyCount
GdipDeleteGraphics
GdipDeletePen
GdipCreatePen1
GdipDeleteBrush
GdipAlloc
GdipFree
GdipCreateFont
kernel32
GetCPInfo
GetLocaleInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
VirtualQuery
InterlockedExchange
HeapSize
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
VirtualAlloc
VirtualFree
HeapDestroy
LCMapStringW
LCMapStringA
GetModuleFileNameA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
RaiseException
RtlUnwind
ExitProcess
VirtualProtect
CreateEventA
GetLastError
CreateFileA
CloseHandle
DeviceIoControl
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
WaitForSingleObject
ResetEvent
GetSystemInfo
GetLocalTime
SetFilePointer
lstrcmpiA
WideCharToMultiByte
MultiByteToWideChar
MapViewOfFile
OpenFileMappingA
ReleaseMutex
Sleep
OpenMutexA
GetTickCount
ResumeThread
CreateThread
ExitThread
lstrcpyA
GetCurrentProcessId
CreateMutexA
GetCommandLineA
GetVersion
lstrcmpW
IsBadReadPtr
GlobalFree
GlobalAlloc
HeapCreate
HeapAlloc
HeapReAlloc
HeapFree
FlushFileBuffers
GetCurrentThreadId
lstrcmpA
SystemTimeToFileTime
GetSystemTime
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
IsBadCodePtr
GetACP
GetOEMCP
SetStdHandle
WriteFile
IsBadWritePtr
user32
GetDC
wsprintfA
GetSystemMetrics
CreateWindowExA
LoadCursorA
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
CharLowerA
RegisterClassExA
ShowWindow
MessageBoxA
gdi32
GetTextExtentPoint32A
GetStockObject
ole32
CreateStreamOnHGlobal
ws2_32
ntohs
ntohl
inet_addr
WSAStartup
send
getsockopt
recv
getsockname
gethostbyname
shutdown
connect
htons
socket
closesocket
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ