c:\home\dvlp\ManagedXLL-branches-4_0\MetroFramework\MetroFramework.Fonts\obj\Release\MetroFramework.Fonts.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Softaim2024/SoftAim 2024.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Softaim2024/SoftAim 2024.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Softaim2024/eac_bypass.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Softaim2024/eac_bypass.dll
Resource
win10v2004-20240611-en
General
-
Target
Softaim2024.zip
-
Size
54.6MB
-
MD5
833bd0ef410ac55686e48eac66c70a84
-
SHA1
0db27d6f330e33411381c8954555549e67d5bb27
-
SHA256
d2b2f8119e2529cd493ff6fd8015fc93041cabacd756c9b03c642875ba6f8e97
-
SHA512
121dade1650dd70dec8d8e8b49e1f8a620c538af15a18a849c2984511dc07e4d021517f5573f2c4866a2cc7e40740234289c46c8249b8867223a7508b9ab098f
-
SSDEEP
786432:pHBfE0aOAFl+kntVG08QZsKJ5g3T/NbpXB6vQDuKF+aGUrgywe3oAP9vB5n1aG7n:ph80sgkC/QZsG5wrJpuEQeYAL5n15
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Softaim2024/SoftAim 2024.exe unpack001/Softaim2024/eac_bypass.dll
Files
-
Softaim2024.zip.zip
-
Softaim2024/SoftAim 2024.exe.exe windows:4 windows x86 arch:x86
a9c887a4f18a3fede2cc29ceea138ed3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
malloc
memset
strcmp
strcpy
getenv
sprintf
fopen
fwrite
fclose
__argc
__argv
_environ
_XcptFilter
__set_app_type
_controlfp
__getmainargs
exit
shell32
ShellExecuteA
kernel32
SetUnhandledExceptionFilter
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56.0MB - Virtual size: 56.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Softaim2024/eac_bypass.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 654KB - Virtual size: 653KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ