Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.MulDrop27.56589.27938.26772.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.MulDrop27.56589.27938.26772.exe
Resource
win10v2004-20240508-en
General
-
Target
SecuriteInfo.com.Trojan.MulDrop27.56589.27938.26772.exe
-
Size
888KB
-
MD5
ce7dc5df5568a79affa540aa86b24773
-
SHA1
86f163a248e2a9eb2209881351029ce2bbcc5b58
-
SHA256
0af21e5bdeaf84c33c172a1170987cca478c2b3e13a3de5653f724f36e278ee4
-
SHA512
41db6df75f549c3545ada6a1a8cb59588df626dbf6786ee35acc69011e370a4e8312e8801f94dda9d86dc55728298bee963db5ae5d0f58575ba6801171bf5d32
-
SSDEEP
12288:7BxGT8EnlLPCyyOe+9kN62Ijrd1L81nVPxM+xS7Tb+rdgg3bTpyN7JGp8wgKCp/y:7Bx0lLPLyOQNf2ryn8+MfG/0F+8lKRlH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Trojan.MulDrop27.56589.27938.26772.exe
Files
-
SecuriteInfo.com.Trojan.MulDrop27.56589.27938.26772.exe.exe windows:4 windows x86 arch:x86
33967a24a261bf787771766b0c0f449a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
GetTempPathA
GetModuleFileNameA
lstrlenA
MoveFileExA
GlobalMemoryStatus
GetModuleHandleA
GetStartupInfoA
WaitForSingleObject
GetSystemInfo
CreateThread
CreateProcessA
GetFileAttributesA
GetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
WriteFile
CloseHandle
ExitThread
Sleep
GetCurrentProcessId
CopyFileA
GetTickCount
user32
MessageBoxA
wsprintfA
advapi32
CreateServiceA
ChangeServiceConfig2A
UnlockServiceDatabase
OpenServiceA
StartServiceA
RegSetValueExA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
LockServiceDatabase
ws2_32
select
__WSAFDIsSet
recv
WSAIoctl
send
WSAStartup
WSASocketA
WSAGetLastError
setsockopt
htonl
sendto
WSACleanup
gethostbyname
socket
htons
connect
closesocket
inet_addr
msvcrt
strlen
strcat
_controlfp
__set_app_type
strcpy
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_iob
malloc
free
rand
sprintf
memset
printf
fprintf
memcpy
_except_handler3
_local_unwind2
strstr
??3@YAXPAX@Z
strrchr
??2@YAPAXI@Z
strncmp
iphlpapi
GetIfTable
psapi
GetMappedFileNameW
shell32
SHGetFolderPathW
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SB360 Size: 844KB - Virtual size: 844KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SB360 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ