Static task
static1
Behavioral task
behavioral1
Sample
RogueNet.exe
Resource
win10-20240404-en
General
-
Target
RogueNet.exe
-
Size
35.8MB
-
MD5
e03605a53102b5b60f9f4daa5848c400
-
SHA1
da5a31c6596d0102adfe930569416f691c5252e8
-
SHA256
c5eadd0aeeb70cba88b2f570910b03fc511a33b99342a29a683f7fb847c645ea
-
SHA512
666ac1d69581719781082b92a975cd5a4f9919f2d6cf95b9d1870bfab1d8692dd358f1b4919405f24222cb74635dfb6162cd4cd9ed94f99a15e0091da199e9e8
-
SSDEEP
786432:Z8esRHMimjJJOsnr0wFwxWmt4gWhw0RfOny3hzRwoOWF:aesRwJtgwFeWmt4gWi0SyxV7F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RogueNet.exe
Files
-
RogueNet.exe.exe windows:6 windows x64 arch:x64
0346904c0d46eab62aebe793097f0742
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shell32
SHFileOperationW
kernel32
DeleteCriticalSection
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
Sections
.text Size: - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.YUi Size: - Virtual size: 23.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.3[- Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Z] Size: 35.8MB - Virtual size: 35.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 917B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ