Static task
static1
Behavioral task
behavioral1
Sample
PLUTONIUM_94.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
PLUTONIUM_94.exe
Resource
win10v2004-20240426-en
General
-
Target
PLUTONIUM_94.exe
-
Size
19.1MB
-
MD5
24eb60b1ae253fd0b07dc29ca2c727b2
-
SHA1
0a9be32e68b7658329b143a6a95d06e16f784b43
-
SHA256
c2bf125457f92ff8e3d365510586df06b44d3c13eceda6d445e7f2d7f118a6f2
-
SHA512
de423c6223c996926d1a5579ea18d1a4c8d61ca8f43b4b301dfeb30eb67d3c385597c96535d937da910a0e08adf37fc033a99dc0a7c728ff042d350505f6019f
-
SSDEEP
393216:ycZYG72B0chIPFSc+AzMrCYp2yWUMTza7LWxh7ij5En:yNi2B0kIPFvjrYEyWXTza7sh7ij5En
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource PLUTONIUM_94.exe
Files
-
PLUTONIUM_94.exe.exe windows:6 windows x64 arch:x64
92d3a92020b6099a7ce4538e79a2de12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapDestroy
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
PostMessageA
advapi32
CryptDestroyHash
shell32
ShellExecuteA
msvcp140
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
ntdll
RtlCaptureContext
normaliz
IdnToAscii
wldap32
ord41
crypt32
CertFreeCertificateChain
ws2_32
htons
rpcrt4
RpcStringFreeA
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
api-ms-win-crt-string-l1-1-0
strncpy
api-ms-win-crt-heap-l1-1-0
calloc
api-ms-win-crt-runtime-l1-1-0
_getpid
api-ms-win-crt-stdio-l1-1-0
_write
api-ms-win-crt-utility-l1-1-0
srand
api-ms-win-crt-math-l1-1-0
_dclass
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-convert-l1-1-0
strtoll
api-ms-win-crt-filesystem-l1-1-0
_fstat64
api-ms-win-crt-locale-l1-1-0
localeconv
Sections
.text Size: - Virtual size: 527KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 322KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.n+w Size: - Virtual size: 13.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.j}2 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.K+k Size: 19.1MB - Virtual size: 19.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ