Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Loader.1550.10308.25499.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Loader.1550.10308.25499.exe
Resource
win10v2004-20240226-en
General
-
Target
SecuriteInfo.com.Trojan.Loader.1550.10308.25499.exe
-
Size
171KB
-
MD5
e3f01ddaebd17109dd8ac24ac6cfb071
-
SHA1
0617c14804c5b12cc54f3963196a8fc312f27886
-
SHA256
c82d610a6a168120809a0c05dd53c9e9b8458d66d13c5fe5cbf2dcf7eef95a5e
-
SHA512
c5bf33b05026b7bde4f8857709c48fdeeb9cbff6819fa2eedd12f50515b194cc65b6e5efb534663676207db191f77a2656c62354f45eb2a63e9806538331913a
-
SSDEEP
1536:rQU43u2wjBDysuPH0GMVKBO0m9Z2z6NvTjbIVJoT8+Tc4dfs8jcdmPqyYgJ/YfSY:0FuxBcUKmeuJI+ndKmPqeJ/Y6zv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Trojan.Loader.1550.10308.25499.exe
Files
-
SecuriteInfo.com.Trojan.Loader.1550.10308.25499.exe.exe windows:6 windows x86 arch:x86
76db9b4b727840a08d9bd714096c369e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CloseHandle
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
IsDebuggerPresent
GetProcessHeap
GetCurrentThreadId
OutputDebugStringW
GetACP
LoadLibraryExW
LoadLibraryW
SetStdHandle
WriteConsoleW
ReadConsoleW
IsValidCodePage
HeapSize
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
WriteFile
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
IsProcessorFeaturePresent
GetModuleHandleW
CreateFileW
EnumTimeFormatsW
GetProcAddress
GetOEMCP
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
Sleep
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineW
InitializeCriticalSectionAndSpinCount
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
wsnmp32
ord103
ord300
ord600
ord602
ord200
ord400
ord503
ord906
resutils
ResUtilGetBinaryProperty
ResUtilGetPropertySize
ResUtilFindDwordProperty
ResUtilStartResourceService
ResUtilStopService
ResUtilSetPrivatePropertyList
ResUtilGetMultiSzProperty
wsock32
getsockname
recvfrom
WSAStartup
MigrateWinsockConfiguration
ord1142
WSAUnhookBlockingHook
WSAAsyncSelect
getsockopt
WSAAsyncGetServByName
ord1104
send
crypt32
CertEnumCRLContextProperties
CertAddEncodedCRLToStore
CertVerifyCRLTimeValidity
CertGetCertificateContextProperty
CryptDecodeMessage
mapi32
ord125
ord11
ord80
ord143
ord170
ord174
ord173
ord26
ord122
rtm
RtmGetFirstRoute
RtmDeleteRouteTable
MgmDeInitialize
RtmBlockConvertRoutesToStatic
RtmIsRoute
MgmReleaseInterfaceOwnership
MgmGetFirstMfe
MgmTakeInterfaceOwnership
gdi32
Pie
GetViewportExtEx
GetGlyphOutlineW
CopyMetaFileW
CreateEnhMetaFileW
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ