C:\yatafekubigu\xegoh\kegokececana\hobof.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab58f2c394aead605975f0ef099f51af8c5a70d2ecfeac3710cb5905409d03f2.exe
Resource
win7-20240704-en
General
-
Target
cd7329155530fb805abb2cace9b32134.bin
-
Size
417KB
-
MD5
90dfab6d7b1837ec9afbb2f5babe2eb6
-
SHA1
11d652a68bba6619a4ad77dfcc98f836102d426d
-
SHA256
a54bb981dd306b559168a53f462732293902b400fffd2ff5bb9c6971e356ca3b
-
SHA512
b3307f77a9d6a5827767177c27934f2547582245515f3b4d17b8075ed70c0de93d6d1bb0dc29fa6c5e63e81a1cd6ec008e35d9e3c7418c828fcf5f0b60a68d3b
-
SSDEEP
12288:ggCkV/zYim4rBkjAExLPnBd3PSxd8yl7LUB+I:gghV/cimfjAMBd3Fyla+I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ab58f2c394aead605975f0ef099f51af8c5a70d2ecfeac3710cb5905409d03f2.exe
Files
-
cd7329155530fb805abb2cace9b32134.bin.zip
Password: infected
-
ab58f2c394aead605975f0ef099f51af8c5a70d2ecfeac3710cb5905409d03f2.exe.exe windows:5 windows x86 arch:x86
Password: infected
62d46ff31d47f63978e2d51da092dc3a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetComputerNameW
AddConsoleAliasW
GetComputerNameW
GetFileAttributesExA
GetTickCount
FindNextVolumeMountPointA
GetUserDefaultLangID
AssignProcessToJobObject
GetModuleFileNameW
InterlockedExchange
GetLogicalDriveStringsA
GetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
CreateJobObjectW
LocalAlloc
MoveFileA
GetNumberFormatW
RemoveDirectoryW
GlobalFindAtomW
EnumResourceTypesW
CreateWaitableTimerW
GetConsoleTitleW
VirtualProtect
DeleteFileW
GetCurrentProcessId
UnregisterWaitEx
GetVolumeInformationW
WriteConsoleA
InterlockedDecrement
CreateFileA
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoW
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetModuleHandleA
RaiseException
RtlUnwind
HeapAlloc
HeapReAlloc
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
GetConsoleOutputCP
WriteConsoleW
user32
GetMenu
gdi32
GetCharABCWidthsFloatW
winhttp
WinHttpSetOption
Sections
.text Size: 400KB - Virtual size: 400KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�ES�u, Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE