E:\_Ali_Documents\BZTest\ATProto\output\ATProto.pdb
Static task
static1
Behavioral task
behavioral1
Sample
56d02f0909f45fe7a43b02ed2c122a77ed86ad0caf154c572d4fa70d0241950e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
56d02f0909f45fe7a43b02ed2c122a77ed86ad0caf154c572d4fa70d0241950e.exe
Resource
win10v2004-20240426-en
General
-
Target
56d02f0909f45fe7a43b02ed2c122a77ed86ad0caf154c572d4fa70d0241950e
-
Size
40KB
-
MD5
4789842c3aebfb1a1f7d7f7385136d18
-
SHA1
0d1aa6e4181e2a0b948ebd7de8148941fa75e46a
-
SHA256
56d02f0909f45fe7a43b02ed2c122a77ed86ad0caf154c572d4fa70d0241950e
-
SHA512
00cc1569a2f1c281bac6c3959e31a61e1ac40cafc6a7f011739b86d7e04ad09586b0b7df9c05927b4f9cb9d95c0ed2a3df0c7194e4ebeb07a8bfaf07a735f865
-
SSDEEP
768:2b+9UO9prDOlWXALf/Wl41qN1pDnWNKpC343qveGj1OgdB0j1j:2K2O9peWXGWlLxpCDeKOE0J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56d02f0909f45fe7a43b02ed2c122a77ed86ad0caf154c572d4fa70d0241950e
Files
-
56d02f0909f45fe7a43b02ed2c122a77ed86ad0caf154c572d4fa70d0241950e.exe windows:5 windows x86 arch:x86
ccc263eed6f33237eb59025e65297206
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
sdl2
SDL_CreateRenderer
SDL_SetRenderDrawColor
SDL_Init
SDL_DestroyWindow
SDL_GetWindowSurface
SDL_CreateWindow
SDL_RenderCopy
SDL_GetTicks
SDL_RenderCopyEx
SDL_FreeSurface
SDL_Quit
SDL_MapRGB
SDL_SetColorKey
SDL_GetError
SDL_PollEvent
SDL_RenderClear
SDL_RenderPresent
SDL_CreateTextureFromSurface
SDL_DestroyTexture
SDL_SetMainReady
SDL_free
SDL_malloc
SDL_iconv_string
SDL_wcslen
SDL_isspace
SDL_DestroyRenderer
sdl2_image
IMG_Load
sdl2_ttf
TTF_OpenFont
TTF_CloseFont
TTF_Init
TTF_Quit
TTF_RenderText_Solid
msvcp100
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
msvcr100
_CIsin
_CIcos
_CIacos
_CIsqrt
memset
_CxxThrowException
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
memcpy
__CxxFrameHandler3
fprintf
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
memmove
printf
??3@YAXPAX@Z
??2@YAPAXI@Z
rand
free
malloc
_wassert
??_V@YAXPAX@Z
_purecall
vsprintf_s
__iob_func
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_crt_debugger_hook
kernel32
IsProcessorFeaturePresent
EncodePointer
DecodePointer
InterlockedExchange
Sleep
InterlockedCompareExchange
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
GetCommandLineW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ