Behavioral task
behavioral1
Sample
b12e9ac5a9e0439b95fab25661b2e277082e26c88ef063f844b2f0168a008c60.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b12e9ac5a9e0439b95fab25661b2e277082e26c88ef063f844b2f0168a008c60.exe
Resource
win10v2004-20240508-en
General
-
Target
b12e9ac5a9e0439b95fab25661b2e277082e26c88ef063f844b2f0168a008c60
-
Size
6.4MB
-
MD5
8d19f1310e5f297f4be07e6133fec3b4
-
SHA1
7aed9fd96fcdd20dfdd0237d778035bef5132724
-
SHA256
b12e9ac5a9e0439b95fab25661b2e277082e26c88ef063f844b2f0168a008c60
-
SHA512
19d51daa66f0c346b53a720c3c97ff30d08732f96c3b61d741c9c0b74e5b358681b143278e0899ecb9f386ad07aadcf4048fb5b77128ec726d80a27419e9de44
-
SSDEEP
98304:HyKyV5K0/yv6hyr2ebRTKW8dVojvaYsaQ2S4xYdN6Lle245X+kK3ORQQlZUItk:HyAfsUwYpQ2pmYpe2OXhK3OqQjUs
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b12e9ac5a9e0439b95fab25661b2e277082e26c88ef063f844b2f0168a008c60
Files
-
b12e9ac5a9e0439b95fab25661b2e277082e26c88ef063f844b2f0168a008c60.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 812KB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1.7MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 80KB - Virtual size: 613KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 288KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 276KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ