midlc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_3f48da1b271d4626c2cfb630530c6de0.exe
Resource
win10v2004-20240508-en
General
-
Target
virussign.com_3f48da1b271d4626c2cfb630530c6de0.vir
-
Size
1.8MB
-
MD5
3f48da1b271d4626c2cfb630530c6de0
-
SHA1
b9a0e69580abc6f74d061ae440b3f863c573d97e
-
SHA256
109fc88e0f04acdf17c88fa4719dc1c40de15d992d032f49790eea0d5cf952b9
-
SHA512
e29b24463a361bc74c767ce25e36f5418c107f95c1a584a842a14c0a2aa4591736304d10d8d29d92fa12ad371388f8810b2b34f432b2297056b5223a506cd30e
-
SSDEEP
49152:o380b/+eq6J6ufuThyzy579o/UARD/RVblI7a8K2mFhbrr:3RulI7K2mF9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource virussign.com_3f48da1b271d4626c2cfb630530c6de0.vir
Files
-
virussign.com_3f48da1b271d4626c2cfb630530c6de0.vir.exe windows:10 windows x64 arch:x64
690d5702409567fc8f463ee4abe543db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
CompareStringA
HeapSetInformation
GetShortPathNameA
Sleep
GetTempPathA
GetLastError
lstrcmpiA
GetTempFileNameA
GetSystemDefaultLCID
IsDBCSLeadByteEx
GetLocaleInfoA
DelayLoadFailureHook
LoadLibraryExA
IsProcessorFeaturePresent
IsDebuggerPresent
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
CloseHandle
WideCharToMultiByte
IsBadStringPtrA
GetProcAddress
LoadLibraryA
MultiByteToWideChar
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
RtlPcToFileHeader
OutputDebugStringA
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
FreeLibrary
msvcrt
_dup
feof
strstr
getenv
_dup2
toupper
realloc
isalpha
strncpy
isxdigit
strncmp
fgetpos
atoi
isspace
fsetpos
isdigit
malloc
atof
tolower
strtoul
putc
_XcptFilter
_amsg_exit
__getmainargs
__set_app_type
_exit
_cexit
__setusermatherr
_initterm
_commode
setvbuf
_ismbblead
memcpy
memset
memmove
??0bad_cast@@QEAA@PEBD@Z
??0__non_rtti_object@@QEAA@PEBD@Z
??0__non_rtti_object@@QEAA@AEBV0@@Z
??0bad_cast@@QEAA@AEBV0@@Z
??0bad_typeid@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBV0@@Z
??1__non_rtti_object@@UEAA@XZ
??1bad_cast@@UEAA@XZ
_CxxThrowException
?terminate@@YAXXZ
_lock
_unlock
__dllonexit
_onexit
memcmp
isleadbyte
free
_iob
_snprintf
_itoa
wctomb
__badioinfo
__pioinfo
_isatty
_write
_lseeki64
_errno
_fileno
_fullpath
_access
_unlink
getc
_splitpath
_fsopen
fseek
_spawnlp
_fmode
fclose
fopen
strtok
ftell
strchr
iscntrl
putchar
_open
_close
__iob_func
_waccess
_ltoa
fgets
fputs
_sopen
rewind
__RTtypeid
??9type_info@@QEBAHAEBV0@@Z
??8type_info@@QEBAHAEBV0@@Z
?name@type_info@@QEBAPEBDXZ
vfprintf
_setmode
fwrite
fprintf
_fstat
_read
_strerror
fflush
__C_specific_handler
_stricmp
exit
printf
_purecall
_vsnprintf
isprint
ungetc
??1type_info@@UEAA@XZ
strcmp
Sections
.text Size: 819KB - Virtual size: 819KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 372KB - Virtual size: 372KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE