D:\workspace\aceview\bin\Win32\Release\pdb\AceLoader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_ea0849f2fbea3d38f9f0f6dc956c8d17_magniber_revil.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-14_ea0849f2fbea3d38f9f0f6dc956c8d17_magniber_revil.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-14_ea0849f2fbea3d38f9f0f6dc956c8d17_magniber_revil
-
Size
2.6MB
-
MD5
ea0849f2fbea3d38f9f0f6dc956c8d17
-
SHA1
d80a341630763f26fb2d48468f6a777af5123695
-
SHA256
6608ecd75b4579ced8a99b0faab1fd87de6b858a5828a85242a654551fc8cadc
-
SHA512
ca104bb970318b5908d664089450b71c35824c264086632e6876ede0cc53b61dfbaeecd4f157b40bd14da8a6e562a0af758949dea09363fa4c1027da03c702d8
-
SSDEEP
49152:0Ms1v6gPYXn1s8rqYl0LKYjp4ZjnkhSPtDIWb/Sz:0Ms1630LKFkhSDz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-14_ea0849f2fbea3d38f9f0f6dc956c8d17_magniber_revil
Files
-
2024-05-14_ea0849f2fbea3d38f9f0f6dc956c8d17_magniber_revil.exe windows:6 windows x86 arch:x86
1660b0f4bd77f00cb279c0102bbb1bd1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
PeekNamedPipe
DeleteFileW
GetFileAttributesExW
SetEndOfFile
SetFilePointer
WriteFile
ReadFile
GetFileSizeEx
FindClose
FindNextFileW
FindFirstFileW
GetNativeSystemInfo
LoadLibraryA
ReleaseMutex
CreateMutexW
GetDriveTypeW
MoveFileW
GetTempFileNameW
MoveFileExW
CreateDirectoryW
WideCharToMultiByte
MultiByteToWideChar
LocalFree
GetCurrentProcess
OpenProcess
LoadLibraryW
FreeLibrary
GetCurrentThreadId
LoadLibraryExW
GetProcAddress
lstrlenW
GetModuleHandleW
GetModuleFileNameW
GetVersionExW
WaitForSingleObject
CloseHandle
GetFileAttributesW
CreateFileW
ExpandEnvironmentStringsW
Sleep
RemoveDirectoryW
DeleteCriticalSection
IsBadStringPtrW
SystemTimeToFileTime
GlobalFree
GlobalAlloc
FileTimeToSystemTime
GetTickCount
LocalAlloc
GetSystemDefaultLCID
ConvertFiberToThread
ReadConsoleA
SetConsoleMode
DecodePointer
GetLastError
InitializeCriticalSectionEx
SetErrorMode
DeleteFiber
WriteConsoleW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
FormatMessageA
GetLocaleInfoEx
GetCurrentDirectoryW
FindFirstFileExW
GetFileInformationByHandle
GetFullPathNameW
SetFileInformationByHandle
AreFileApisANSI
GetFileInformationByHandleEx
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
EncodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetStringTypeW
CompareStringEx
GetCPInfo
GetTimeZoneInformation
GetEnvironmentVariableW
SetEnvironmentVariableW
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
OutputDebugStringW
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
WakeAllConditionVariable
SleepConditionVariableSRW
GetStartupInfoW
GetCurrentProcessId
RtlUnwind
InterlockedPushEntrySList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
GetStdHandle
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapAlloc
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
ReadConsoleW
SetConsoleCtrlHandler
HeapReAlloc
HeapSize
IsValidCodePage
GetACP
GetOEMCP
SystemTimeToTzSpecificLocalTime
user32
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
SendMessageTimeoutW
EnumWindows
GetClassNameW
advapi32
CryptGetUserKey
ConvertSidToStringSidW
RegEnumKeyW
GetAclInformation
CryptReleaseContext
RegQueryInfoKeyA
DeregisterEventSource
RegisterEventSourceW
ReportEventW
GetAce
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegEnumValueW
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetUserNameW
EqualSid
CopySid
DeleteAce
RegQueryInfoKeyW
CryptAcquireContextW
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
AddAce
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
CryptSignHashW
CryptEnumProvidersW
RegOpenCurrentUser
GetTokenInformation
GetSecurityInfo
GetLengthSid
SetSecurityInfo
InitializeAcl
OpenProcessToken
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHChangeNotify
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
shlwapi
SHDeleteKeyW
imm32
ImmDisableIME
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateContext
CertNameToStrW
CertOpenStore
wintrust
CryptCATAdminCalcHashFromFileHandle
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WinVerifyTrust
CryptCATAdminEnumCatalogFromHash
CryptCATAdminAcquireContext
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseContext
CryptCATAdminReleaseCatalogContext
ws2_32
WSACleanup
WSAGetLastError
recv
send
WSASetLastError
closesocket
bcrypt
BCryptGenRandom
Exports
Exports
CheckSigner
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 608KB - Virtual size: 607KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ