Behavioral task
behavioral1
Sample
54a5312d3771c86a86afd671c190b4ee998a5b74479c86867f4ca6453ce8104e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
54a5312d3771c86a86afd671c190b4ee998a5b74479c86867f4ca6453ce8104e.exe
Resource
win10v2004-20240508-en
General
-
Target
54a5312d3771c86a86afd671c190b4ee998a5b74479c86867f4ca6453ce8104e
-
Size
5.7MB
-
MD5
c71b02d2fa2f3e5584c554faae3238a9
-
SHA1
508057a2a9f22491ea127bede272352fc33c4af3
-
SHA256
54a5312d3771c86a86afd671c190b4ee998a5b74479c86867f4ca6453ce8104e
-
SHA512
7501d34e44623e69cf7eb06977717122521c685183d88a4879224d8352b6bb76fad838791cec7e5cbba18a15e0951e3e596dbb11dc8f46f70553eed296d0b141
-
SSDEEP
98304:kzgzsJNUOHarP4aRBX52gxPGDpP4pdA/qUnAXblOWo:kqYMP4U536yGnR1
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54a5312d3771c86a86afd671c190b4ee998a5b74479c86867f4ca6453ce8104e
Files
-
54a5312d3771c86a86afd671c190b4ee998a5b74479c86867f4ca6453ce8104e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 350KB - Virtual size: 729KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 3.0MB - Virtual size: 7.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 31KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 11KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imports Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ