Behavioral task
behavioral1
Sample
439bcad86efe793e25a896bedbebbcbb1de01905eece9fa49cb5856a1bd562d4.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
439bcad86efe793e25a896bedbebbcbb1de01905eece9fa49cb5856a1bd562d4.exe
Resource
win10v2004-20240426-en
General
-
Target
60cac2cfa628440830e4199831e20d99b48c0ded434822d1f144368c74ec4229
-
Size
416KB
-
MD5
9b60c2b7de0029e286d81c4814514368
-
SHA1
e31d5f5dfbc207cdfa8a5815cf49068925f4006c
-
SHA256
60cac2cfa628440830e4199831e20d99b48c0ded434822d1f144368c74ec4229
-
SHA512
bdfccab6517d0126579a8388a0f8e307399f9299a56559876763f2678b3489c9de307e9ae77c4096062d8c1579a7105eab2fccf6bb174246b0fefe5e6dd1380f
-
SSDEEP
12288:MImxJ/86b27ku+ckCIrcKzsCdTqQPuVOIkNR8ThLX:MIoRiYcXisChqQPenkb8TF
Malware Config
Signatures
-
resource yara_rule static1/unpack001/439bcad86efe793e25a896bedbebbcbb1de01905eece9fa49cb5856a1bd562d4.exe dcrat -
Dcrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/439bcad86efe793e25a896bedbebbcbb1de01905eece9fa49cb5856a1bd562d4.exe
Files
-
60cac2cfa628440830e4199831e20d99b48c0ded434822d1f144368c74ec4229.zip
Password: infected
-
439bcad86efe793e25a896bedbebbcbb1de01905eece9fa49cb5856a1bd562d4.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 814KB - Virtual size: 814KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ