C:\Users\admin\source\repos\Loader\Release\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f669dc0c28a4f80344c99e804d10a007b6ccc18951de3de0a338d1f3b30df5db.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f669dc0c28a4f80344c99e804d10a007b6ccc18951de3de0a338d1f3b30df5db.exe
Resource
win10v2004-20240226-en
General
-
Target
16843361786.zip
-
Size
114KB
-
MD5
a601d0c27c7bdc42d9cb16f5c8770d37
-
SHA1
7b29a301b0e630a61bffc00757cf76f3b61a84a7
-
SHA256
1d58fea649c5ff478be65e0ae6dfedc7b648015362a51ec119499482f0317ecc
-
SHA512
0f0b49156e04372c7a7bc370385a979d32e300f7a1159f436522fe2c2da6fbddb915724fe5971580379fd071fbc7c47969e04c408ae3bf1a926b30df32bdfe92
-
SSDEEP
3072:+x2VttrxrB9ELD1Bo5yzNA7OYiOs3CJWWsYq:62V9rbELrAQNjWsywP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f669dc0c28a4f80344c99e804d10a007b6ccc18951de3de0a338d1f3b30df5db
Files
-
16843361786.zip.zip
Password: infected
-
f669dc0c28a4f80344c99e804d10a007b6ccc18951de3de0a338d1f3b30df5db.exe windows:6 windows x86 arch:x86
Password: infected
03a82c0ac5929b47abb76c2d3a7773e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnumDateFormatsA
HeapAlloc
DecodePointer
GetProcessHeap
SetCommState
GetConsoleOriginalTitleA
HeapReAlloc
HeapSize
LoadResource
GetConsoleOutputCP
FlushFileBuffers
CreateFileW
SetInformationJobObject
GetFileSizeEx
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
LoadLibraryW
FreeConsole
CloseHandle
DeleteFileW
FileTimeToSystemTime
UpdateProcThreadAttribute
GetLastError
GetExitCodeThread
ConvertThreadToFiberEx
GetCommTimeouts
GetWriteWatch
InitializeProcThreadAttributeList
SetFileTime
GetCurrentProcess
SetConsoleTextAttribute
HeapFree
GetConsoleMode
GetOEMCP
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
GetCPInfo
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetFilePointerEx
CreateDirectoryW
WriteConsoleW
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetFileType
MultiByteToWideChar
user32
GetWindowLongA
GetActiveWindow
SetParent
GetMessageTime
GetMenuInfo
EnableWindow
EndPaint
SetForegroundWindow
IsDlgButtonChecked
GetCaretBlinkTime
DragDetect
SetCaretPos
CloseWindow
OpenIcon
GetClassNameA
gdi32
ColorMatchToTarget
GetFontUnicodeRanges
GetWorldTransform
FillPath
CreateBitmapIndirect
DeleteColorSpace
CopyEnhMetaFileA
CreateHatchBrush
SetWindowOrgEx
CheckColorsInGamut
DeleteDC
SelectPalette
PlayMetaFile
ExcludeClipRect
PtInRegion
GetObjectA
DPtoLP
shell32
SHGetFolderPathW
DragQueryPoint
ole32
CoCreateInstance
CoUninitialize
CoInitialize
shlwapi
PathQuoteSpacesA
comctl32
ord8
uxtheme
IsThemePartDefined
GetThemeSysColorBrush
GetThemeSysString
IsThemeBackgroundPartiallyTransparent
DrawThemeParentBackground
IsAppThemed
GetThemeSysInt
SetThemeAppProperties
Sections
.text Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ