Behavioral task
behavioral1
Sample
2532-16-0x0000000000400000-0x0000000001F1A000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2532-16-0x0000000000400000-0x0000000001F1A000-memory.exe
Resource
win10v2004-20240419-en
General
-
Target
2532-16-0x0000000000400000-0x0000000001F1A000-memory.dmp
-
Size
27.1MB
-
MD5
ce8f3b284867fd99622dff6726c633ae
-
SHA1
80a08e66a2dcb2a43247d0b114ce5af88f2d4e5f
-
SHA256
50e4277301d84236a0fab76e79fbe8c2add5563f2e08c54bf8ade0d7611c54fa
-
SHA512
7c40385adefad21f5e67a752876706eba30a6b6b3eb2b524e03ad9ba071adfcf86ea955daeb559ca050b6096e642404a0a0183aabd7a29513ffce8ab942a0b71
-
SSDEEP
196608:IxGdTUHo9jZMLqzi3tI29TS60FIEPgaJzR1VOoaOVxRt:IxGPGLqzi3XT0uEp/ooaWz
Malware Config
Signatures
-
Privateloader family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2532-16-0x0000000000400000-0x0000000001F1A000-memory.dmp
Files
-
2532-16-0x0000000000400000-0x0000000001F1A000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 6.4MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE