D:\a\ConcordiaDLL\ConcordiaDLL\bin\Release\net8.0-windows\win-x64\native\Concordia.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_93e4e73b999ded967dab1ec3cb688aa5_megazord.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-01_93e4e73b999ded967dab1ec3cb688aa5_megazord.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-01_93e4e73b999ded967dab1ec3cb688aa5_megazord
-
Size
8.7MB
-
MD5
93e4e73b999ded967dab1ec3cb688aa5
-
SHA1
cad52554565cd4e48511d2296cf3aa6738097870
-
SHA256
69be078c80ebed20539626492ade82cf8b7253ca0fd1d15fbc2fa180f1a16013
-
SHA512
1e4cf70dad9a14b05b5cd58d5ce4dc1ee78f2e3ed8eacde1083d08bbbddbd876d166e9b791ddc502a1b31efd1e49c31ac4d6bbd009180f4b3724ac4b73220bda
-
SSDEEP
98304:MZEx+tafxz19886LbWpO81neAeWVOogmgQL:LffxzkbWpV1neAjVng0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-01_93e4e73b999ded967dab1ec3cb688aa5_megazord
Files
-
2024-06-01_93e4e73b999ded967dab1ec3cb688aa5_megazord.exe windows:6 windows x64 arch:x64
cd5e0b60676502b7dbd9691f471d5345
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegEnumKeyExW
GetTokenInformation
DuplicateTokenEx
OpenThreadToken
RevertToSelf
ImpersonateLoggedOnUser
CheckTokenMembership
bcrypt
BCryptCreateHash
BCryptEncrypt
BCryptDecrypt
BCryptExportKey
BCryptFinishHash
BCryptGetProperty
BCryptHashData
BCryptImportKey
BCryptImportKeyPair
BCryptOpenAlgorithmProvider
BCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptDestroyKey
BCryptDestroyHash
BCryptGenRandom
crypt32
CertFreeCertificateChainEngine
CertCloseStore
PFXImportCertStore
PFXExportCertStore
CryptFindOIDInfo
CryptQueryObject
CryptMsgGetParam
CryptMsgClose
CryptImportPublicKeyInfoEx2
CryptFormatObject
CryptDecodeObject
CertVerifyTimeValidity
CertSetCertificateContextProperty
CertSerializeCertificateStoreElement
CertSaveStore
CertOpenStore
CertVerifyCertificateChainPolicy
CertFreeCertificateContext
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CryptProtectMemory
CryptUnprotectMemory
CertAddCertificateContextToStore
CertAddCertificateLinkToStore
CertControlStore
CertCreateCertificateChainEngine
CertFindCertificateInStore
CertFindExtension
CertFreeCertificateChain
CertGetCertificateChain
CertGetIntendedKeyUsage
CertGetNameStringW
CertGetValidUsages
CertNameToStrW
iphlpapi
GetAdaptersAddresses
GetPerAdapterInfo
GetNetworkParams
if_nametoindex
kernel32
RtlUnwindEx
RtlPcToFileHeader
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
RaiseException
UnhandledExceptionFilter
SetLastError
GetProcAddress
GetLastError
LoadLibraryA
VirtualAllocEx
WriteProcessMemory
WaitForSingleObject
GetExitCodeThread
CreateRemoteThread
AllocConsole
ExitProcess
FormatMessageW
GetCPInfoExW
GetConsoleMode
GetFileType
ReadFile
ReadConsoleW
WriteFile
WriteConsoleW
GetConsoleOutputCP
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
K32EnumProcessModulesEx
CloseHandle
IsWow64Process
GetExitCodeProcess
CreateProcessW
TerminateProcess
OpenProcess
K32EnumProcesses
K32GetModuleInformation
K32GetModuleBaseNameW
K32GetModuleFileNameExW
GetProcessId
DuplicateHandle
QueryFullProcessImageNameW
CreatePipe
GetCurrentProcess
GetConsoleCP
QueryPerformanceCounter
GetTickCount64
LoadLibraryExW
CancelIoEx
CloseThreadpoolIo
GetCommandLineW
GetCurrentProcessId
RaiseFailFastException
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
GetSystemTime
GetLocaleInfoEx
GetCurrentThread
Sleep
DeleteCriticalSection
LocalFree
EnterCriticalSection
SleepConditionVariableCS
LeaveCriticalSection
WakeConditionVariable
InitializeCriticalSection
InitializeConditionVariable
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForMultipleObjectsEx
GetCurrentThreadId
CreateThreadpoolWait
SetThreadpoolWait
WaitForThreadpoolWaitCallbacks
CloseThreadpoolWait
CreateThreadpoolWork
CloseThreadpoolWork
SubmitThreadpoolWork
QueryPerformanceFrequency
GetFullPathNameW
GetLongPathNameW
GetCPInfo
LocalAlloc
CancelSynchronousIo
CreateIoCompletionPort
CopyFileExW
CreateDirectoryW
CreateFileW
CreateThreadpoolIo
StartThreadpoolIo
CancelThreadpoolIo
DeleteFileW
DeviceIoControl
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FlushFileBuffers
FreeLibrary
GetCurrentDirectoryW
GetFileAttributesExW
GetFileInformationByHandleEx
GetModuleFileNameW
GetOverlappedResult
GetSystemDirectoryW
OpenThread
QueryUnbiasedInterruptTime
SetCurrentDirectoryW
SetFileInformationByHandle
SetFilePointerEx
SetThreadErrorMode
CreateThread
ResumeThread
GetThreadPriority
SetThreadPriority
GetDynamicTimeZoneInformation
GetTimeZoneInformation
GetCurrentProcessorNumberEx
SetEvent
ResetEvent
CreateEventExW
GetEnvironmentVariableW
FlushProcessWriteBuffers
WaitForSingleObjectEx
RtlVirtualUnwind
RtlCaptureContext
RtlRestoreContext
AddVectoredExceptionHandler
FlsAlloc
FlsGetValue
FlsSetValue
CreateEventW
SwitchToThread
SuspendThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
QueryInformationJobObject
GetModuleHandleW
GetModuleHandleExW
GetProcessAffinityMask
InitializeContext
GetEnabledXStateFeatures
SetXStateFeaturesMask
VirtualQuery
GetSystemTimeAsFileTime
InitializeCriticalSectionEx
DebugBreak
SleepEx
GlobalMemoryStatusEx
GetSystemInfo
GetLogicalProcessorInformation
GetLogicalProcessorInformationEx
GetLargePageMinimum
VirtualUnlock
VirtualAllocExNuma
IsProcessInJob
GetNumaHighestNodeNumber
GetProcessGroupAffinity
K32GetProcessMemoryInfo
EncodePointer
DecodePointer
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
GetProcessHeap
RtlLookupFunctionEntry
ncrypt
NCryptOpenKey
NCryptImportKey
NCryptDeleteKey
NCryptOpenStorageProvider
NCryptGetProperty
NCryptSetProperty
NCryptFreeObject
ole32
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoGetApartmentType
CoGetContextToken
CoCreateGuid
CoWaitForMultipleHandles
secur32
GetUserNameExW
ws2_32
shutdown
setsockopt
send
select
recv
ioctlsocket
WSAConnect
getpeername
bind
WSAIoctl
WSAEventSelect
FreeAddrInfoExW
WSASend
WSARecv
getsockopt
GetNameInfoW
closesocket
WSAGetOverlappedResult
GetAddrInfoW
FreeAddrInfoW
WSASocketW
GetAddrInfoExW
WSAStartup
WSACleanup
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
realloc
_callnewh
malloc
calloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
ceil
floor
pow
modf
api-ms-win-crt-string-l1-1-0
_stricmp
strcpy_s
strcmp
wcsncmp
api-ms-win-crt-convert-l1-1-0
strtoull
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_register_onexit_function
_configure_wide_argv
abort
terminate
_set_app_type
_seh_filter_exe
_get_initial_wide_environment
_initialize_onexit_table
_initterm
_initterm_e
exit
_exit
__p___argc
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___wargv
_initialize_wide_environment
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Exports
Exports
DotNetRuntimeDebugHeader
Sections
.text Size: 494KB - Virtual size: 494KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.managed Size: 4.6MB - Virtual size: 4.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
hydrated Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 382KB - Virtual size: 382KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ