C:\colabadale13 moca_diyavariye.pdb
Static task
static1
Behavioral task
behavioral1
Sample
30647636b3bff8dc2e7ffdd191cf3b75e43b1fc3d4793b7ed5edc8a9d512b54d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
30647636b3bff8dc2e7ffdd191cf3b75e43b1fc3d4793b7ed5edc8a9d512b54d.exe
Resource
win10v2004-20240412-en
General
-
Target
fc5580516b24e3aff552362da99e45cd1376af7c0b8b5cd60c2ad568ac8fac4d
-
Size
129KB
-
MD5
a3badf4d9a2b3ba7e05b720ce14951b2
-
SHA1
0e1048b09cca3c4fc35bdb5e18a9f3669b8f0d7a
-
SHA256
fc5580516b24e3aff552362da99e45cd1376af7c0b8b5cd60c2ad568ac8fac4d
-
SHA512
6fddc95e667cabd6b5c5883c063322b6248403dca5113a03c773f571ffca09e7fb3f7eda39c8aba5a3a6bd9e4ea4bf22bed8c8411a98b62ca1be7ef5373aa929
-
SSDEEP
1536:e3hu9JlGVMSwnVDzoNICAe/yBxlHIIwvA2BJx5O3p5YRCtqgrL0lzULM4JOO5gxV:eREuGcaBPI1NSwwt/Y1UAn4e/J4WB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/30647636b3bff8dc2e7ffdd191cf3b75e43b1fc3d4793b7ed5edc8a9d512b54d.exe
Files
-
fc5580516b24e3aff552362da99e45cd1376af7c0b8b5cd60c2ad568ac8fac4d.zip
Password: infected
-
30647636b3bff8dc2e7ffdd191cf3b75e43b1fc3d4793b7ed5edc8a9d512b54d.exe.exe windows:5 windows x86 arch:x86
e1f06156624c8e8748c883d42e94f8bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
QueryDosDeviceA
SetCommBreak
GetTickCount
LoadLibraryW
GetModuleFileNameW
SetComputerNameExW
CreateJobObjectA
GetLogicalDriveStringsA
GetLastError
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
SetVolumeLabelW
RemoveDirectoryA
InterlockedDecrement
WriteConsoleA
LocalAlloc
MoveFileA
FindFirstVolumeMountPointW
FindNextChangeNotification
GlobalFindAtomW
GetModuleHandleA
GetConsoleTitleW
GetFileAttributesExW
FatalAppExitA
GetCurrentProcessId
AddConsoleAliasA
DebugBreak
DeleteFileA
LoadLibraryA
InterlockedIncrement
MultiByteToWideChar
GetStartupInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
HeapSize
ExitProcess
EnterCriticalSection
LeaveCriticalSection
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
RaiseException
advapi32
DeleteAce
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 38.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ