Behavioral task
behavioral1
Sample
d386e05c1cb3c758088645f8b892c305c04be0344859c866e1fed690504439a3.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d386e05c1cb3c758088645f8b892c305c04be0344859c866e1fed690504439a3.dll
Resource
win10v2004-20240611-en
General
-
Target
d386e05c1cb3c758088645f8b892c305c04be0344859c866e1fed690504439a3.exe
-
Size
521KB
-
MD5
b4a6b7316167a3e0625dd6765864e062
-
SHA1
3b12c6528b5dc4d421846bebbf2c248de65dd457
-
SHA256
d386e05c1cb3c758088645f8b892c305c04be0344859c866e1fed690504439a3
-
SHA512
189dee6f5289ef9501518b10cf91e4d4345ec98ace73021353890a0cee01da3a073101cf408a35dfece6aaa2e5119402f3fdf66f5b9a80fc0abed19ccac58a91
-
SSDEEP
6144:quzVfMjzfsz4dXpg9JWg1d9CiF2X0lFiJJ6+knHnvAQhW6a6aJdt22HvjP3jL3:/BMjDpg5et2uzTL3
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Detects executables built or packed with MPress PE compressor 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_MPress -
Detects ransomware indicator 1 IoCs
resource yara_rule sample SUSP_RANSOMWARE_Indicator_Jul20 -
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d386e05c1cb3c758088645f8b892c305c04be0344859c866e1fed690504439a3.exe
Files
-
d386e05c1cb3c758088645f8b892c305c04be0344859c866e1fed690504439a3.exe.dll windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Sections
.text Size: 502KB - Virtual size: 502KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ