C:\BuildAgent\work\33b2b67282fffa05\tminstaller\Teramind.Setup\Teramind.Setup.Remover\obj\Release\Teramind.Setup.Remover.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_957ffc4843f2852b24733be6da4e7ff1_avoslocker_revil.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-28_957ffc4843f2852b24733be6da4e7ff1_avoslocker_revil.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-28_957ffc4843f2852b24733be6da4e7ff1_avoslocker_revil
-
Size
6.5MB
-
MD5
957ffc4843f2852b24733be6da4e7ff1
-
SHA1
dde1d8f86404ddefa81d7cbf5c85818cf117f1a2
-
SHA256
121ef52121ab3e087e53a23e362feaae7bb1625b1e4d893f36ca899522315c90
-
SHA512
a910b84f557b95a926d39ad78f5b0fe815d3bfd64a38dc72b9006722f4a8f80ea9c5c793a86bb436a5852ffd8395955a15ed7dcc9ecd4a099742c6f380d96cdb
-
SSDEEP
98304:fI9tiSH6a6gfFCZ8th/yp3qvZ4ypOKRxoBBTxBQk6dtQ:fAH6aff4+4p84yjRyBNxqQ
Malware Config
Signatures
-
Detects executables manipulated with Fody 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Fody -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-28_957ffc4843f2852b24733be6da4e7ff1_avoslocker_revil
Files
-
2024-05-28_957ffc4843f2852b24733be6da4e7ff1_avoslocker_revil.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 6.4MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ