C:\Users\Lenovo\Desktop\XieBro-v3.3\XieBro-v3.3\Resources\Unmanaged.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6f90f15c3337288d0fc686f6f2e3988043c126c356d6096e99158e60f91c3403.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f90f15c3337288d0fc686f6f2e3988043c126c356d6096e99158e60f91c3403.exe
Resource
win10v2004-20240709-en
General
-
Target
6f90f15c3337288d0fc686f6f2e3988043c126c356d6096e99158e60f91c3403.exe
-
Size
73KB
-
MD5
f21b99b36592ff7415d56841d4fd62d0
-
SHA1
965e4ab55cf6defc90fb705e7fd8a34da89aef8a
-
SHA256
6f90f15c3337288d0fc686f6f2e3988043c126c356d6096e99158e60f91c3403
-
SHA512
572c30c0bbdbe275962b7b745272f54f26fb5dc4a174b59e8115c82e1954f300b8d60f96552df25e05b884eda275320bfa38c7b59eb62cdfd0deb55017d65e99
-
SSDEEP
768:IOEXYRpKodXNyVX7FgFrrm4rjO29DnK1JreG7PzGgt4Z6TDQ/wPdPtNR+d7iuhjJ:FkQ7dyVyrrkzF8CPdsiuUzu/ac
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f90f15c3337288d0fc686f6f2e3988043c126c356d6096e99158e60f91c3403.exe
Files
-
6f90f15c3337288d0fc686f6f2e3988043c126c356d6096e99158e60f91c3403.exe.exe windows:6 windows x64 arch:x64
14767932c761829cdc869ee3b15e7ec4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
MultiByteToWideChar
GetProcAddress
LoadLibraryW
Sleep
LocalFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleExW
FreeLibrary
ExitProcess
LeaveCriticalSection
EnterCriticalSection
RaiseException
EncodePointer
VirtualQuery
RtlUnwindEx
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetLastError
advapi32
RegOpenKeyExW
RegQueryValueExW
oleaut32
SafeArrayDestroy
VariantInit
SafeArrayUnlock
SysFreeString
SafeArrayPutElement
SafeArrayLock
SafeArrayCreate
SafeArrayCreateVector
VariantClear
SysAllocString
wininet
InternetOpenA
ws2_32
recv
connect
socket
send
inet_addr
WSAStartup
closesocket
WSACleanup
htons
msvcrt
__argc
__argv
?_set_new_mode@@YAHH@Z
_commode
_msize
?terminate@@YAXXZ
___lc_codepage_func
_isatty
fflush
_fileno
ceil
log10
realloc
_environ
__pctype_func
_iob
_unlock
_lock
strcpy_s
_errno
abort
_set_fmode
_initterm_e
_initterm
_callnewh
malloc
free
atoi
memmove
_local_unwind
__DestructExceptionObject
_amsg_exit
__C_specific_handler
memset
_CxxThrowException
tolower
__set_app_type
_XcptFilter
wctomb_s
_mbtowc_l
strtol
wcstol
wcsnlen
strnlen
_clearfp
___mb_cur_max_func
__getmainargs
memcpy
__CxxFrameHandler3
strrchr
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ