Behavioral task
behavioral1
Sample
fa0e9e5559910365f159a438c5b6ebc401dbdfe0e349a63c85f695d61a904500.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa0e9e5559910365f159a438c5b6ebc401dbdfe0e349a63c85f695d61a904500.exe
Resource
win10v2004-20240412-en
General
-
Target
a963ffef0ef9cfcee28853394947cb02.bin
-
Size
416KB
-
MD5
00d422192ac691799a509125255937f0
-
SHA1
126e598292f4377bd07b53b0d79a9730e2c67aa2
-
SHA256
3b970ad4a44ed9e6417f49a9a998c7e901c70406e639a327301f2423971c4a1c
-
SHA512
2b79ea2db1d9529bded6406293b49f0beb567658071f53b5108ab0bd299c6e640d86246707c92cf2c938bdaf583c5111176b3f67b5c70db5a82069d23c7ee121
-
SSDEEP
12288:iw6bQL5FdAsOX4KweQXNp6sMo3pf8PYjGrzNfUOcbgfukkirohidf33Y8hhZ:iw6bQL7c4MbsRnjGNf6bg2kkeohi9Y8d
Malware Config
Signatures
-
resource yara_rule static1/unpack001/fa0e9e5559910365f159a438c5b6ebc401dbdfe0e349a63c85f695d61a904500.exe dcrat -
Dcrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/fa0e9e5559910365f159a438c5b6ebc401dbdfe0e349a63c85f695d61a904500.exe
Files
-
a963ffef0ef9cfcee28853394947cb02.bin.zip
Password: infected
-
fa0e9e5559910365f159a438c5b6ebc401dbdfe0e349a63c85f695d61a904500.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 814KB - Virtual size: 814KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ