D:\Development\GOLD-BACKDOOR\Release\Gold2.pdb
Behavioral task
behavioral1
Sample
485246b411ef5ea9e903397a5490d106946a8323aaf79e6041bdf94763a0c028.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
485246b411ef5ea9e903397a5490d106946a8323aaf79e6041bdf94763a0c028.exe
Resource
win10v2004-20240226-en
General
-
Target
485246b411ef5ea9e903397a5490d106946a8323aaf79e6041bdf94763a0c028
-
Size
1.1MB
-
MD5
8a7ed15dfd5e385b3913129c372cc026
-
SHA1
ff172a51c13c1a3be7f2c8b1e9352492e2ee01d6
-
SHA256
485246b411ef5ea9e903397a5490d106946a8323aaf79e6041bdf94763a0c028
-
SHA512
9f8621babba1917e4907d563f068a39c9db64f908e9e6083a9c8520558090117fdc6159e5af38f44524bdc2eecf4d4e6b9e2bba3053e190322aee18642ffd9a4
-
SSDEEP
24576:2QLVx+nSmMsWO1ANzhNJutjOuXLmDbbRfh3qacMWOEjzDHLPOCTYZMS98kx9:2u0nSmM9O14hNJWXqPxhSpOELLPOCTMV
Malware Config
Signatures
-
GoldBackdoor payload 1 IoCs
Processes:
resource yara_rule sample family_goldbackdoor -
Goldbackdoor family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 485246b411ef5ea9e903397a5490d106946a8323aaf79e6041bdf94763a0c028
Files
-
485246b411ef5ea9e903397a5490d106946a8323aaf79e6041bdf94763a0c028.exe windows:6 windows x86 arch:x86
1359bc5e32064d6cd85d5d1dabfed078
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLocalTime
CreateMutexA
WaitForSingleObject
ReleaseMutex
TerminateThread
CreateThread
CreateDirectoryW
RemoveDirectoryW
GetFileAttributesW
lstrcpyW
lstrlenW
WriteFile
ExpandEnvironmentStringsA
DeleteFileW
CreateFileW
GetDriveTypeW
CreateMutexW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetLogicalDrives
GetTempPathW
GetVolumeNameForVolumeMountPointW
LoadLibraryA
GetProcAddress
DeviceIoControl
FindFirstFileA
GetCurrentProcess
GetSystemTimes
FindNextFileA
CreateToolhelp32Snapshot
K32GetProcessMemoryInfo
Process32FirstW
GetComputerNameW
GlobalMemoryStatusEx
IsWow64Process
CloseHandle
CheckRemoteDebuggerPresent
DeleteFileA
SetFileAttributesA
FileTimeToSystemTime
GetFullPathNameW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
SetConsoleMode
ReadConsoleInputA
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
Sleep
SetFileAttributesW
HeapSize
FindClose
InitializeCriticalSectionEx
FindNextFileW
HeapFree
OpenProcess
TerminateProcess
VirtualAlloc
ExpandEnvironmentStringsW
VirtualFree
GetProcessHeap
SystemTimeToFileTime
SetFilePointer
FlushConsoleInputBuffer
GlobalMemoryStatus
GetModuleHandleA
SetEndOfFile
WriteConsoleW
SetStdHandle
FindFirstFileExA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
IsDebuggerPresent
DeleteCriticalSection
Process32NextW
FindFirstFileW
WideCharToMultiByte
EncodePointer
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
OutputDebugStringW
LocalFree
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
DuplicateHandle
CreateProcessA
CreateProcessW
ExitProcess
GetModuleHandleExW
ReadFile
MoveFileExW
GetStdHandle
GetModuleFileNameA
GetCommandLineA
GetCommandLineW
GetACP
GetFileType
GetExitCodeProcess
GetFileAttributesExW
CreatePipe
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
SetConsoleCtrlHandler
SetFilePointerEx
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
GetCurrentDirectoryW
user32
GetWindowTextW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
wsprintfW
GetForegroundWindow
GetWindowTextA
GetKeyState
IsWindowVisible
EnumWindows
advapi32
RegOpenKeyExW
SystemFunction036
RegSetKeyValueW
RegCloseKey
RegDeleteKeyValueW
ReportEventA
RegQueryValueExW
RegGetValueA
GetUserNameW
DeregisterEventSource
RegisterEventSourceA
ole32
CoTaskMemAlloc
PropVariantClear
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
StringFromGUID2
oleaut32
VariantInit
VariantClear
shlwapi
SHStrDupW
ord219
ord12
iphlpapi
GetIpAddrTable
wininet
InternetOpenUrlA
InternetConnectW
InternetCloseHandle
HttpSendRequestW
InternetCrackUrlW
InternetOpenW
HttpQueryInfoA
InternetQueryOptionW
HttpOpenRequestW
InternetCheckConnectionW
InternetSetOptionW
InternetOpenA
InternetReadFile
Sections
.text Size: 805KB - Virtual size: 804KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 292KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ