Behavioral task
behavioral1
Sample
Batapro.exe
Resource
win10v2004-20240426-en
General
-
Target
Batapro.exe
-
Size
738KB
-
MD5
71b81937a63149221b0f1893673feb60
-
SHA1
4236ca0e2f876da5f52e266bf711bca21a83e974
-
SHA256
bf530d986a3152b576d36275fdadf0f9c439230fd0f446d1296b8380cacb9279
-
SHA512
16d221307fe845bb1da4abbcc41a688f0cd2caa75495990e3c120a9e27ab63528b0099d1fdf09fa931eb66eff675797b2caaef202dcd82fea2fed06ed3eb9284
-
SSDEEP
12288:TAPTERIP7QBU1JanUy2p3BmW1ko01b+Hkfg4z9jsTM6M+3JXMJ8ePTbn:87sU1+UyKmokL1KEfg4+w6xWJ7PTbn
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule sample agile_net -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Batapro.exe
Files
-
Batapro.exe.exe windows:4 windows x86 arch:x86
Password: NIGGER.EXE
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
39$8`0f Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 655KB - Virtual size: 655KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.NeCD Size: 512B - Virtual size: 134B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.null Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
N2A1NBA9 Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ