Z:\Projects\Loader\Release\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4172fe6a455e268925121dccf16e6a8b66028d7c2eba87a9a683b718639a252d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4172fe6a455e268925121dccf16e6a8b66028d7c2eba87a9a683b718639a252d.exe
Resource
win10v2004-20240508-en
General
-
Target
4172fe6a455e268925121dccf16e6a8b66028d7c2eba87a9a683b718639a252d
-
Size
19KB
-
MD5
53b3ab8680a59af9c37ffefaef2b52ef
-
SHA1
b8c8d90263426ad485c9afc4ea9e04b755417dbf
-
SHA256
4172fe6a455e268925121dccf16e6a8b66028d7c2eba87a9a683b718639a252d
-
SHA512
5c97dcc2956221d756e74d989c59ca9a5c343f71a3395bc4edd87b8ade96204c58e63ca807c1afa64b6bd465fbc2e12ead4658b95493495fdcdb7985bfcefb19
-
SSDEEP
384:yIToumyhfQEtex3gVwy8F0J4KpVAUu41pMul338:7TKyXtk3hOPLA5KD3M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4172fe6a455e268925121dccf16e6a8b66028d7c2eba87a9a683b718639a252d
Files
-
4172fe6a455e268925121dccf16e6a8b66028d7c2eba87a9a683b718639a252d.exe windows:5 windows x86 arch:x86
d0b8285184365a838ba34f4f2ef57766
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetSetOptionW
HttpSendRequestW
InternetConnectW
InternetReadFile
HttpQueryInfoW
HttpOpenRequestW
InternetQueryOptionW
InternetOpenW
kernel32
HeapCreate
GetModuleFileNameW
DeleteFileW
CloseHandle
GetCurrentDirectoryW
GetTempPathW
lstrlenW
lstrcmpW
ExitProcess
GetFileSize
HeapAlloc
GetModuleHandleW
WriteFile
ReadFile
CreateFileW
user32
wsprintfW
shell32
ShellExecuteW
Sections
.text Size: 1024B - Virtual size: 891B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 154B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ