D:\Проекты\Allcome\Source code\Build\Release\Build.pdb
Behavioral task
behavioral1
Sample
69ee540d78678ca031d4b00626415ca52f22f57f96c4504203490e9234f60b55.exe
Resource
win7-20240221-en
General
-
Target
69ee540d78678ca031d4b00626415ca52f22f57f96c4504203490e9234f60b55
-
Size
128KB
-
MD5
2a82f35e7a79350c0a1257358130c4e3
-
SHA1
b57cfc659efa353f98b379446879607e1557899a
-
SHA256
69ee540d78678ca031d4b00626415ca52f22f57f96c4504203490e9234f60b55
-
SHA512
a839742a450b9baf2dcd731592bc4cedd4af4271912fbc4711f87ef091fe9ea464dfbed2ba07b28ea156c029a36eb40b70c8093759593644ebcd6b822844236e
-
SSDEEP
3072:9rn4CuDcpMkymV5x0RCVZeeUebHCDYp61FmHhe8pTAV02DtEb:9r4Ndkf5xUCXUXDY8TDtEb
Malware Config
Extracted
allcome
http://62.109.16.47/API/2/configure.php?cf6zrlhn=tuffdebil
DT8qmpTEqkbS1f41LFbbJxNu4gQtq6vU9c
rndEWHECqLsUt9miLwqW3RYmW63obkDucj
0xc4B4D212105d8851b0AAc48B01e0408d9956da27
Xj6ujQQNd2u2xKE5RK3g6ZJhoKmxDjTGKG
TKtQmTGQ4QJjzvPNqerkpk15P3c1AfbuK6
t1RNmZVMrdyT6XjPukeDFkkicsyejUYEE45
GCUNI73ZCKWSLR3Q3XM5D5JY6DKAFFFROM24UPFRTAJS2D52TRRRC532
42CzrSj7VTyRt1GB5tERnaSBJSEBJanQVgErPXHmBhCWQ3hzpvfFJUvAVommbRU65dKYyGRK2pHZdcHBE41nEQ13FoARFM6
qr8lrc2yz86jyjsu8mluckud4g9jhktjsggj4xn7kj
131Qoe2y3TGKRKg31doXKj1sYw5QoUx869
0xc4B4D212105d8851b0AAc48B01e0408d9956da27
LW7EWoy18v5AYu31ULMg3P1EoyT4w3srEq
ronin:23613a91878db0847e3d22f3c3812b996b38071a
MEJzu6SkhEDJvofLjwLwTTRqeZoCCVBAEx
ltc1q3d8c47dmek3c7pg6sj9uzqj99gxa0kfky2fml0
Signatures
-
Allcome family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69ee540d78678ca031d4b00626415ca52f22f57f96c4504203490e9234f60b55
Files
-
69ee540d78678ca031d4b00626415ca52f22f57f96c4504203490e9234f60b55.exe windows:6 windows x86 arch:x86
b1e8695b9eed440cd1ef5f8703820ee1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
CopyFileA
SetFileAttributesA
CreateDirectoryA
Process32First
CreateMutexA
WaitForSingleObject
CreateToolhelp32Snapshot
Process32Next
GetModuleFileNameA
MultiByteToWideChar
CreateFileW
DecodePointer
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
GetProcessHeap
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceFrequency
CloseHandle
WaitForSingleObjectEx
Sleep
GetExitCodeThread
InitializeCriticalSectionEx
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
RtlUnwind
RaiseException
GetLastError
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetStdHandle
WriteFile
GetModuleFileNameW
HeapFree
HeapAlloc
GetFileType
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
WriteConsoleW
user32
EmptyClipboard
CloseClipboard
GetClipboardData
SetClipboardData
IsClipboardFormatAvailable
LoadStringA
GetKeyState
OpenClipboard
shell32
ShellExecuteA
SHGetSpecialFolderPathA
urlmon
IsValidURL
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ