OPENSSL_Applink
Static task
static1
Behavioral task
behavioral1
Sample
BADWARE LATEST.zip
Resource
win10v2004-20240802-en
General
-
Target
BADWARE LATEST.zip
-
Size
79.5MB
-
MD5
a28a32dacf302c3809cb97c99c8e76d8
-
SHA1
3594cde7578fc2515aa3574799f7d064353dec14
-
SHA256
9d5dcbf689adbc53fc9878007dc2e1351dd9e660010ba51b4f98bdaae192d4a5
-
SHA512
7a88bcd21ce072842dc86f4d9ebe9886e70134683ac319ee3696208e54bbd4d1f52c10ccfb67cacd2459d667dfbe0eaa4cc54c8a970c09bb24ce18aad4d10b31
-
SSDEEP
1572864:vxwcLB97ySZC0dCbOJzHTFY9H6AsP2q/gtUbR1DQchWX:vKYByACbkm9HG5zDly
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/BADWARE LATEST/BwPaidTempSpafer.exe
Files
-
BADWARE LATEST.zip.zip
-
BADWARE LATEST/BwPaidTempSpafer.exe.exe windows:6 windows x64 arch:x64
8e5502bf7a0d13464c370fbf87e65f32
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentThreadId
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
MessageBoxA
advapi32
SetSecurityInfo
msvcp140
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
ntdll
RtlInitUnicodeString
normaliz
IdnToAscii
wldap32
ord143
crypt32
CertEnumCertificatesInStore
ws2_32
setsockopt
rpcrt4
RpcStringFreeA
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcpy
api-ms-win-crt-runtime-l1-1-0
_resetstkoflw
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
api-ms-win-crt-heap-l1-1-0
malloc
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-filesystem-l1-1-0
_access
api-ms-win-crt-convert-l1-1-0
strtoull
api-ms-win-crt-string-l1-1-0
tolower
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-math-l1-1-0
__setusermatherr
shell32
ShellExecuteA
Exports
Exports
Sections
.text Size: - Virtual size: 632KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mea Size: - Virtual size: 53.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.I$r Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Tum Size: 79.5MB - Virtual size: 79.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
BADWARE LATEST/bwbynotlkv.1337