Behavioral task
behavioral1
Sample
hackist_protected.exe
Resource
android-x64-20240221-en
General
-
Target
hackist_protected.exe
-
Size
8.0MB
-
MD5
b74de35f6b9438eae00fda48b9d3e4b6
-
SHA1
e1da91bfd7c9c28860dbbb5de789986339e61c9b
-
SHA256
a6b26d73a97aee7c386680f10f44825552717dc73031dc3081a1f0f4f24a51f9
-
SHA512
fdc5604148691372af5cf2bb10672d6019655e3917ae907781f7e0c5f4b36709243afaded2fea008d4cf15ad0fb0118e4120aedb55faa2361e146c9a9f962abb
-
SSDEEP
196608:vhaHNBdmZdE7ajjVVcTHvPKHZHw3DdokBTWeTttRbcYC9ll:viUZcFvPKpwh/ZXoYCN
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource hackist_protected.exe
Files
-
hackist_protected.exe.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 1.2MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 6.8MB - Virtual size: 6.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ