F:\memexec\test_loading\target\release\deps\test_loading.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-03_51d3e41932ea1dc1b573453131603338_megazord.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-03_51d3e41932ea1dc1b573453131603338_megazord.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-03_51d3e41932ea1dc1b573453131603338_megazord
-
Size
2.1MB
-
MD5
51d3e41932ea1dc1b573453131603338
-
SHA1
2d186856ad1f208d8f1fa244191f9d907c21a5af
-
SHA256
608b4c4989febd86166e32dde0901c36c797cf8a81661347a51b7815ee7cf8c9
-
SHA512
fb1d107457e09d6ced9a95445b374681d399382ff6abb8f756732dd4bffad5d8a3a4c2bb97b9ee5b3057f11195e79141cf0868c53d753cc473fe9f4b46bbf53f
-
SSDEEP
49152:l3ib/fEu7nMS/8zrNCiLZ72xL62eJWua:lyb/VDMS/8tCiLZUW2vua
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-03_51d3e41932ea1dc1b573453131603338_megazord
Files
-
2024-06-03_51d3e41932ea1dc1b573453131603338_megazord.exe windows:6 windows x64 arch:x64
8e9645808df00a57eb2b150d117d3096
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
MessageBoxA
kernel32
HeapSize
AcquireSRWLockExclusive
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
ReleaseSRWLockExclusive
LoadLibraryExA
FreeLibrary
GetConsoleOutputCP
HeapAlloc
HeapFree
FlsGetValue
FlsAlloc
GetLastError
WaitForSingleObject
CloseHandle
FormatMessageW
GetProcessHeap
GetCurrentProcess
FindClose
FindNextFileW
CreateFileW
FlushFileBuffers
SetFilePointerEx
GetStringTypeW
SetStdHandle
GetModuleHandleA
GetSystemTimeAsFileTime
GetCPInfo
RtlLookupFunctionEntry
ReleaseSRWLockShared
GetEnvironmentStringsW
SetEnvironmentVariableW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
LoadLibraryExW
TlsFree
GetProcAddress
AcquireSRWLockShared
SetThreadStackGuarantee
GetCurrentThread
Sleep
AddVectoredExceptionHandler
GetStdHandle
QueryPerformanceCounter
QueryPerformanceFrequency
ReleaseMutex
WaitForSingleObjectEx
GetCurrentProcessId
CreateMutexA
RtlCaptureContext
GetConsoleMode
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
SetLastError
GetModuleHandleW
FreeEnvironmentStringsW
LoadLibraryA
ExitProcess
HeapReAlloc
GetCommandLineW
TlsSetValue
TlsGetValue
TlsAlloc
GetModuleFileNameW
GetFullPathNameW
GetEnvironmentVariableW
InitializeCriticalSectionAndSpinCount
GetCurrentDirectoryW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
IsProcessorFeaturePresent
GetFileType
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
RtlVirtualUnwind
InitializeSListHead
TryAcquireSRWLockExclusive
GetCurrentThreadId
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
oleaut32
SafeArrayDestroy
VariantClear
SafeArrayUnaccessData
SafeArrayGetLBound
SafeArrayGetUBound
GetErrorInfo
SafeArrayAccessData
SysStringLen
SysFreeString
SysAllocStringLen
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
ntdll
NtWriteFile
RtlNtStatusToDosError
Sections
.text Size: 515KB - Virtual size: 514KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ