Hello
Behavioral task
behavioral1
Sample
544831d0d280223ef51df2c85bf12e550029fad4ccebe9df0b6e2481de345767.dll
Resource
win7-20240221-en
General
-
Target
544831d0d280223ef51df2c85bf12e550029fad4ccebe9df0b6e2481de345767
-
Size
2.5MB
-
MD5
11270854ee2976b24ee1e6fdca9cbe40
-
SHA1
852c2117def4242cabba5ae7ddd4016bdfd42840
-
SHA256
544831d0d280223ef51df2c85bf12e550029fad4ccebe9df0b6e2481de345767
-
SHA512
adb7f25d7daf527f9adee8174c1907cb97cc1376a6ee9e8c1945935ef14e0540a0b88434dd9f43f96b924e4b17db5e2c26737a059476ac41fecee2169241a1a2
-
SSDEEP
49152:rLTqR/ArM3pvBpHyLWXm3iizCbTc8xP3kM0omJWOg5vfRuYJbXDIP:nTE/ArqvJmyieTcycoK7g5Xp0
Malware Config
Signatures
-
Detects executables packed with Themida 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Themida -
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 544831d0d280223ef51df2c85bf12e550029fad4ccebe9df0b6e2481de345767
Files
-
544831d0d280223ef51df2c85bf12e550029fad4ccebe9df0b6e2481de345767.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Exports
Exports
Sections
Size: 53KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 4KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 4KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.exports Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imports Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ