C:\i\obsydium.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6be870a327fedb1258622601ddb2462e4464b4ab345a7d51a3fab53bb4788e19.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6be870a327fedb1258622601ddb2462e4464b4ab345a7d51a3fab53bb4788e19.exe
Resource
win10v2004-20240802-en
General
-
Target
6be870a327fedb1258622601ddb2462e4464b4ab345a7d51a3fab53bb4788e19.zip
-
Size
119KB
-
MD5
69dd6919616c718e1628a8b22ad39841
-
SHA1
484a0d87fa3e91f4af659627c8c79acbe225536c
-
SHA256
c702e25497247c8b8b366600c78c2c19fd582c7ba93d2ff9e4f5c203a8086013
-
SHA512
46b4e6fbdcd89621782a3f7a9978b13cd48b3269cb9a3ad43070df028ecf1185e05fd5598e6ba0d5de7408676d4aae1b91d87a15c2dde05fa7a201b584a61003
-
SSDEEP
3072:7Bmge3Fw2jFsPQ3qqh45L3MiMrbTHKkJ2iDy7CyEv/:lm9CQqqh45LciMr/KA9sza/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6be870a327fedb1258622601ddb2462e4464b4ab345a7d51a3fab53bb4788e19.exe
Files
-
6be870a327fedb1258622601ddb2462e4464b4ab345a7d51a3fab53bb4788e19.zip.zip
Password: infected
-
6be870a327fedb1258622601ddb2462e4464b4ab345a7d51a3fab53bb4788e19.exe.exe windows:5 windows x86 arch:x86
8152d2e8f0aa40ea8eea4a10c4472fc5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
RtlAdjustPrivilege
NtRaiseHardError
RtlUnwind
kernel32
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetProcessHeap
HeapReAlloc
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
HeapAlloc
HeapFree
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleWindow
ExitProcess
SetFilePointerEx
CreateThread
CloseHandle
GetVersionExA
TerminateThread
Sleep
CreateFileW
WriteFile
HeapSize
ReadConsoleW
TlsSetValue
GetACP
GetModuleFileNameA
GetStdHandle
GetModuleHandleExW
RaiseException
MultiByteToWideChar
GetLastError
WideCharToMultiByte
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentThreadId
GetCurrentProcess
SwitchToThread
GetCurrentThread
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
SetEvent
GetThreadTimes
FreeLibrary
LoadLibraryExW
WriteConsoleW
user32
EndPaint
BeginPaint
GetCursorPos
ReleaseDC
InvalidateRect
UpdateWindow
GetDesktopWindow
GetMessageA
DispatchMessageA
LoadCursorA
GetDC
MessageBoxW
FillRect
ScreenToClient
CallNextHookEx
GetSystemMetrics
ShowWindow
SetTimer
SetWindowsHookExA
RegisterClassA
DefWindowProcA
CreateWindowExA
SetLayeredWindowAttributes
TranslateMessage
PostQuitMessage
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateDIBSection
CreateCompatibleDC
GetStockObject
DeleteDC
CreatePen
Polygon
Ellipse
DeleteObject
CreateSolidBrush
winmm
waveOutPrepareHeader
waveOutOpen
waveOutClose
waveOutUnprepareHeader
waveOutWrite
msimg32
TransparentBlt
AlphaBlend
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ