Static task
static1
Behavioral task
behavioral1
Sample
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe
Resource
win11-20240412-en
General
-
Target
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521
-
Size
131KB
-
MD5
fa158ba3d7801e203da61c7eafa12a13
-
SHA1
eb71f862c7603797a9d7d46bda545f7d9280f451
-
SHA256
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521
-
SHA512
0f47c06526cb8d0e8302e440baac91e49e1fa3541e8d86e724c46dcc3b4ba2ffae445b3d217d58cb8ff66380036b98e82fc7b6f3980120d4c599d5497ce5edd1
-
SSDEEP
1536:BL+O/U7OBmKGS6CBK0t/ZCXPGuxgDM5YKBGNc/xf6KWcs8+SUkIcekqY1o/uImz2:BLxUyjp3xCTyDMsUWyw+Ubx7NX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521
Files
-
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe windows:6 windows x64 arch:x64
1e6846ec68cd8341fea5c898085896c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptGenRandom
BCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptSecretAgreement
BCryptImportKeyPair
BCryptDestroySecret
BCryptDeriveKey
BCryptExportKey
BCryptDestroyKey
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
CryptDecodeObject
ws2_32
WSACleanup
inet_addr
inet_ntoa
closesocket
gethostbyname
WSAStartup
send
socket
connect
recv
htons
setsockopt
WSAGetLastError
secur32
InitSecurityInterfaceA
kernel32
CreateThread
TerminateThread
GetModuleFileNameA
Sleep
GetConsoleWindow
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetStdHandle
GetCurrentThreadId
GetLocalTime
GetTickCount
GetCommandLineW
LocalFree
GetEnvironmentVariableA
LoadLibraryA
ReadFile
WriteFile
SetFilePointer
GetFileAttributesA
CreateFileA
CloseHandle
GetFileSize
FlushFileBuffers
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
user32
ShowWindow
advapi32
RegEnumValueA
RegSetValueExA
CryptSetHashParam
CryptDuplicateHash
CryptEncrypt
CryptSetKeyParam
CryptImportKey
CryptDestroyKey
CryptCreateHash
CryptHashData
CryptDestroyHash
RegQueryInfoKeyA
RegCloseKey
CryptReleaseContext
RegOpenKeyExA
CryptGetHashParam
CryptGenRandom
CryptAcquireContextA
shell32
CommandLineToArgvW
msvcrt
__CxxFrameHandler3
atexit
vprintf
free
malloc
vsprintf_s
_vscprintf
sscanf
_mkgmtime
time
wcstombs
memmove
memchr
memcmp
memcpy
memset
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ