Static task
static1
Behavioral task
behavioral1
Sample
Flxxdz Bypass (2).exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Flxxdz Bypass (2).exe
Resource
win10v2004-20240802-en
General
-
Target
Flxxdz Bypass (2).exe
-
Size
4.1MB
-
MD5
53bb261b57bab3bb0bdc25ab6441a67d
-
SHA1
80760fe2fd8f9243b8cdfe339f023f54c0209ee9
-
SHA256
f56cb9d4135f13c17044663738c38b7869d57befe42d6df32e19fe2a77a117e2
-
SHA512
6f90a2b709c716a2c0024b6f638cb75dfa01d9e4b1c908a52f01797b51422a2765fb0d125844baff8aff6a533881cc6d3275523d2f61c1d52f038785c385c880
-
SSDEEP
98304:TxagfUzydiOlbqZavRtas/ADTfmPHQ7BdgZZ9a:TIgdZKa/afzbY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Flxxdz Bypass (2).exe
Files
-
Flxxdz Bypass (2).exe.exe windows:6 windows x64 arch:x64
2b9b67c10d0e8e6e5d8662b8774933a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleHandleA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
user32
FindWindowW
advapi32
SetSecurityInfo
msvcp140
_Query_perf_frequency
normaliz
IdnToAscii
wldap32
ord60
crypt32
CertCloseStore
ws2_32
gethostname
shlwapi
PathFindFileNameW
rpcrt4
RpcStringFreeA
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__C_specific_handler
api-ms-win-crt-runtime-l1-1-0
system
api-ms-win-crt-stdio-l1-1-0
fputs
api-ms-win-crt-filesystem-l1-1-0
_fstat64
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-math-l1-1-0
_dclass
api-ms-win-crt-heap-l1-1-0
_set_new_mode
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-time-l1-1-0
_localtime64
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-string-l1-1-0
strncmp
api-ms-win-crt-utility-l1-1-0
qsort
shell32
ShellExecuteA
Sections
.text Size: - Virtual size: 470KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.13370 Size: - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.13371 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.13372 Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ