Behavioral task
behavioral1
Sample
82605b3e2083ba7ffaebc606fe6126c1e2b3fe56438b23e548dedd9b52a6fcf3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82605b3e2083ba7ffaebc606fe6126c1e2b3fe56438b23e548dedd9b52a6fcf3.exe
Resource
win10v2004-20240412-en
General
-
Target
27915b065e4ce2a1a6e069838676313319a818da7e9ec5d685e24afcb3d412f3
-
Size
416KB
-
MD5
d52606149d683dc3587ded4ca3450438
-
SHA1
91dfd4f7409bd73115df2eb095a517b54e3744d3
-
SHA256
27915b065e4ce2a1a6e069838676313319a818da7e9ec5d685e24afcb3d412f3
-
SHA512
ef3c21f27f2f26c43074933b3976df8419d10141a19900de3f574d0b5353f4da0d9c47f30b81cab3c432b10becf1fd9ad269e132d48a6ff2e22416741ec063f9
-
SSDEEP
12288:cEhyXTs3HcbnAa2IjAffAyXEuUsex40G8A:B3EnAXIUffvEu44N
Malware Config
Signatures
-
resource yara_rule static1/unpack001/82605b3e2083ba7ffaebc606fe6126c1e2b3fe56438b23e548dedd9b52a6fcf3.exe dcrat -
Dcrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/82605b3e2083ba7ffaebc606fe6126c1e2b3fe56438b23e548dedd9b52a6fcf3.exe
Files
-
27915b065e4ce2a1a6e069838676313319a818da7e9ec5d685e24afcb3d412f3.zip
Password: infected
-
82605b3e2083ba7ffaebc606fe6126c1e2b3fe56438b23e548dedd9b52a6fcf3.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 814KB - Virtual size: 813KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ