C:\tuduk\mabineyoxox\bujakaj\gatujewihune\piliso.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6a93a157b3bcb0d13e61ace2f3735864c7636bd462569d435590eb5730d45cdf_a80b7efeeabb9fb3c240fcac9ae0c121a73.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a93a157b3bcb0d13e61ace2f3735864c7636bd462569d435590eb5730d45cdf_a80b7efeeabb9fb3c240fcac9ae0c121a73.exe
Resource
win10v2004-20240802-en
General
-
Target
6a93a157b3bcb0d13e61ace2f3735864c7636bd462569d435590eb5730d45cdf_a80b7efeeabb9fb3c240fcac9ae0c121a732d6896480f437b66913f16c19f440.exe
-
Size
263KB
-
MD5
02b123199a5c34ef343209dd9bfb295d
-
SHA1
6859c7a747123fd8b08bceaab5d1ce57a2a92b17
-
SHA256
a80b7efeeabb9fb3c240fcac9ae0c121a732d6896480f437b66913f16c19f440
-
SHA512
a505ebc86ce49b6b394997913ae981a63b41732bb548bb2da636cc939e81176977e928aaa4837ae0907d966b1f177ef5979d80690be07707ce30650c1e4d5a90
-
SSDEEP
3072:b6Wsxs5zRMOuBbvYRe8ZPzFJHqKYi8l3Ecgvkgr25Roadr:OtkRbuBrcLWR1hg83jN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a93a157b3bcb0d13e61ace2f3735864c7636bd462569d435590eb5730d45cdf_a80b7efeeabb9fb3c240fcac9ae0c121a732d6896480f437b66913f16c19f440.exe
Files
-
6a93a157b3bcb0d13e61ace2f3735864c7636bd462569d435590eb5730d45cdf_a80b7efeeabb9fb3c240fcac9ae0c121a732d6896480f437b66913f16c19f440.exe.exe windows:5 windows x86 arch:x86
f716126e27e937edfa36622dcce173e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedIncrement
GetConsoleAliasesLengthA
GlobalAlloc
LoadLibraryW
CreateEventA
GetBinaryTypeA
GetModuleFileNameW
CreateJobObjectA
GetPrivateProfileIntW
GetLastError
GetLongPathNameW
SetLastError
FreeLibrary
MoveFileW
ReadFileEx
GlobalFree
LoadLibraryA
OpenJobObjectW
SetConsoleTitleW
EnumDateFormatsW
CloseHandle
GetProcAddress
GetConsoleAliasesLengthW
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetModuleHandleW
ExitProcess
WriteFile
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
HeapReAlloc
FlushFileBuffers
SetStdHandle
WriteConsoleW
CreateFileW
user32
ClientToScreen
advapi32
ReportEventA
ole32
CoRevokeMallocSpy
Sections
.text Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hazip Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 388KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE