C:\Users\Coool\Desktop\Stealer-New\LastUpdate\try_2\x64\Release\try.pdb
Resubmissions
10-08-2024 16:31
240810-t1c9eaxfpq 10Behavioral task
behavioral1
Sample
get-password.exe
Resource
win10v2004-20240802-en
General
-
Target
get-password.exe
-
Size
11.5MB
-
MD5
414ae240ce50f7ed37714f9264d1c557
-
SHA1
2e4651b9c8253b68d757c88d1b139386bbc6cb23
-
SHA256
794693da4c93431e60e51d4c22f3879c468e2b12fe080493a8cc632d5952c6bb
-
SHA512
0942f035778a0918791c9d6b47a8ef642230852347ffa5183c3fb9027316773606090d896d528ca348a3e779311b7d14068fe45f37ad663a9c70aa93207cbe86
-
SSDEEP
196608:ExSZuZxvCuenVet4Nu0Tzz0QADnq/bQA1HeT39IigleE9TFa0Z8DOjCdylVSEhkd:EEZQvCuenVet4Nu0TUYp1+TtIiHY9Z81
Malware Config
Signatures
-
Detects Pyinstaller 1 IoCs
resource yara_rule sample pyinstaller -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource get-password.exe
Files
-
get-password.exe.exe windows:6 windows x64 arch:x64
4bf6930a218757031d2553169dd43010
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
winhttp
WinHttpSetTimeouts
WinHttpGetIEProxyConfigForCurrentUser
WinHttpOpenRequest
WinHttpGetProxyForUrl
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSetOption
WinHttpQueryOption
WinHttpQueryDataAvailable
WinHttpSetStatusCallback
WinHttpWriteData
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpOpen
WinHttpQueryAuthSchemes
WinHttpSetCredentials
WinHttpSendRequest
WinHttpGetDefaultProxyConfiguration
WinHttpAddRequestHeaders
gdi32
DeleteDC
GetDIBits
GetObjectW
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
BitBlt
DeleteObject
bcrypt
BCryptCloseAlgorithmProvider
BCryptCreateHash
BCryptHashData
BCryptFinishHash
BCryptDestroyHash
BCryptGetProperty
BCryptOpenAlgorithmProvider
BCryptGenRandom
user32
GetWindowRect
wsprintfW
GetDC
GetDesktopWindow
ReleaseDC
ole32
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
oleaut32
SysFreeString
VariantInit
SysStringByteLen
SysAllocStringByteLen
SysAllocString
VariantClear
kernel32
InitializeCriticalSectionAndSpinCount
RtlUnwindEx
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetDriveTypeW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
ExitProcess
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitThread
ReadFile
SizeofResource
FindFirstFileW
FindNextFileW
GetShortPathNameW
DeviceIoControl
TerminateProcess
GetModuleFileNameW
K32GetModuleFileNameExW
GetEnvironmentVariableW
InitializeCriticalSectionEx
CreateFileW
OpenProcess
SetCurrentDirectoryA
CreateToolhelp32Snapshot
MultiByteToWideChar
GetLastError
Process32NextW
CreateFileA
GetDiskFreeSpaceExW
LoadLibraryA
lstrcatW
LockResource
GlobalAlloc
Process32FirstW
GlobalFree
CloseHandle
LoadResource
FindResourceW
K32EnumProcesses
DecodePointer
GetProcAddress
GlobalLock
LocalFree
DeleteCriticalSection
CreateProcessW
WideCharToMultiByte
lstrcpyW
GlobalUnlock
GetVolumeInformationByHandleW
GetSystemTimeAsFileTime
GetModuleHandleA
FormatMessageW
VerSetConditionMask
VerifyVersionInfoW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
GetThreadTimes
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SetEvent
WaitForSingleObject
CreateEventW
GetSystemDirectoryW
FreeLibrary
GetModuleHandleW
LoadLibraryW
Sleep
MoveFileExW
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
GetFileType
PeekNamedPipe
WaitForMultipleObjects
GetCurrentProcessId
SleepEx
GetFileSizeEx
FlushFileBuffers
MapViewOfFile
CreateFileMappingW
FormatMessageA
GetSystemTime
SystemTimeToFileTime
GetProcessHeap
GetFileSize
LockFileEx
HeapDestroy
HeapCompact
HeapAlloc
GetSystemInfo
HeapReAlloc
SetFilePointerEx
DeleteFileA
FlushViewOfFile
OutputDebugStringW
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapSize
HeapValidate
UnmapViewOfFile
GetFileAttributesW
CreateMutexW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
WriteFile
GetFullPathNameW
HeapFree
HeapCreate
AreFileApisANSI
RaiseException
InitializeCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
SetFileInformationByHandle
CopyFileW
GetFileInformationByHandleEx
CreateSymbolicLinkW
RtlUnwind
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
RtlPcToFileHeader
GetLocaleInfoEx
WakeAllConditionVariable
SleepConditionVariableSRW
InitOnceComplete
InitOnceBeginInitialize
GetStringTypeW
TryAcquireSRWLockExclusive
LCMapStringEx
EncodePointer
CompareStringEx
GetCPInfo
CreateThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibraryAndExitThread
LoadLibraryExW
GetCurrentProcess
InitializeSListHead
InterlockedPushEntrySList
IsDebuggerPresent
GetConsoleMode
ReadConsoleW
DeleteFileW
GetConsoleOutputCP
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
SetStdHandle
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
UnlockFile
IsProcessorFeaturePresent
advapi32
CryptDestroyKey
RegGetValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptEncrypt
CryptImportKey
RegQueryValueExW
CryptDestroyHash
shell32
ShellExecuteW
SHGetFolderPathW
ws2_32
setsockopt
getnameinfo
ioctlsocket
freeaddrinfo
getsockopt
recv
ntohs
gethostname
sendto
recvfrom
listen
htonl
bind
socket
send
getsockname
getpeername
WSAStartup
getaddrinfo
accept
htons
WSAIoctl
inet_ntop
inet_pton
WSASetLastError
WSAWaitForMultipleEvents
WSASocketW
connect
shutdown
select
closesocket
__WSAFDIsSet
WSACleanup
WSACloseEvent
WSACreateEvent
WSAGetLastError
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
crypt32
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateContext
CryptUnprotectMemory
CryptUnprotectData
CertFindCertificateInStore
CryptStringToBinaryW
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringW
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 564KB - Virtual size: 564KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8.0MB - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
all_2.pyc