Static task
static1
Behavioral task
behavioral1
Sample
NextRP_Hack.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
NextRP_Hack.exe
Resource
win10v2004-20240508-en
General
-
Target
NextRP_Hack.exe
-
Size
10.3MB
-
MD5
19e0f410a7fc10dd2320b66d6fb7cee2
-
SHA1
1befad4b0af83157691574efecdd59f8c914415e
-
SHA256
0f4ae1702dcd6ce704880fdaa4f298f44ec90e44454dc01263ceaef573221427
-
SHA512
295cce72fedaa20cef34b6cf25a7938bcf75005c6140e12c4b40d11bf20a5d20123f024a9518d4cfd764a16b2eff6f30167776e304f1aba057005d9beac085d6
-
SSDEEP
196608:JjTvONTorPLoBA1HeT39IigwJeE9TFa0Z8DOjCdylaoCnzmQd40nbx9K:JjTvuErMq1+TtIiFwY9Z8D8Cclluy1iW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NextRP_Hack.exe
Files
-
NextRP_Hack.exe.exe windows:5 windows x64 arch:x64
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
lstrcpy
Sections
Size: 134KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qttekbgi Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
skpnokke Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
finder.pyc