GetFullLicenseTry.pdb
Static task
static1
Behavioral task
behavioral1
Sample
42f0fbd471e0e6a67f397586277506f9c03cadfded18052255139dd69ae9c0c4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42f0fbd471e0e6a67f397586277506f9c03cadfded18052255139dd69ae9c0c4.exe
Resource
win10v2004-20240426-en
General
-
Target
42f0fbd471e0e6a67f397586277506f9c03cadfded18052255139dd69ae9c0c4
-
Size
57KB
-
MD5
3b3e391b2136dd8be82c13924a6ba3ba
-
SHA1
7334381b398072bc306a577bbc1cd7543904dbdc
-
SHA256
42f0fbd471e0e6a67f397586277506f9c03cadfded18052255139dd69ae9c0c4
-
SHA512
67dfbf5e1efc67716acb1358be374d0a23abc91d03f1fbfed95a38c2c6c23f72de124729237468cfea971bfecede2fee44ee370966f2f19acdac01057a53629a
-
SSDEEP
768:wIsSkjQ/hR+QP+coklyt071QMLhe9o3t43ElAAW/r5fX874ba/u:9kjQ5P+cokk07Vg98iUlAAchX87zm
Malware Config
Signatures
-
Detects executables packed with ConfuserEx Mod 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_ConfuserEx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42f0fbd471e0e6a67f397586277506f9c03cadfded18052255139dd69ae9c0c4
Files
-
42f0fbd471e0e6a67f397586277506f9c03cadfded18052255139dd69ae9c0c4.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
kk?^uC Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ