C:\Users\realr\Documents\Dev\Projects\junin\payload\x64\Release\payload.pdb
Static task
static1
Behavioral task
behavioral1
Sample
21d1f9fc3f498685dc1f6738344e5fffe73798c394bb27eaf4d1f275b65c8017.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
21d1f9fc3f498685dc1f6738344e5fffe73798c394bb27eaf4d1f275b65c8017.exe
Resource
win10v2004-20240802-en
General
-
Target
48dfbf3004a2eb53b0025b6268180193.bin
-
Size
7KB
-
MD5
5ba233457e8325d7e11af1b684114da9
-
SHA1
50a914a5302c049a93bca20b76afa3cc988513da
-
SHA256
7f0e124497b36da841aadbc7b80b3295aeeec3e0c08f74f5a0375757020c88e2
-
SHA512
86ac294ebca6152bbfe57a7fcfd408fdd60c48ecdfe958d7f7c5212a1a2a1589410b48de190bcfd91a9f5312ef7c079e3a70ade2050ecef6c952440055ef948b
-
SSDEEP
192:1+peiMC2mIAS5ufYV9N/W++qwuvzsL+Vn/fuJR6h:1+8vCSpV3Wp7ugL+Eih
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/21d1f9fc3f498685dc1f6738344e5fffe73798c394bb27eaf4d1f275b65c8017.exe
Files
-
48dfbf3004a2eb53b0025b6268180193.bin.zip
Password: infected
-
21d1f9fc3f498685dc1f6738344e5fffe73798c394bb27eaf4d1f275b65c8017.exe.exe windows:6 windows x64 arch:x64
Password: infected
4ec8eccc2ae96957e8e89aeef4ae71b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
VirtualProtect
GetCurrentProcess
GetModuleHandleA
Sleep
LoadLibraryA
GetSystemInfo
GetProcAddress
GlobalMemoryStatusEx
GetModuleHandleW
IsDebuggerPresent
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
user32
EnumWindows
vcruntime140
memset
_CxxThrowException
__current_exception
__C_specific_handler
strstr
__std_exception_copy
__current_exception_context
__std_exception_destroy
memcpy
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
_set_new_mode
api-ms-win-crt-convert-l1-1-0
mbstowcs
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
__p__commode
_set_fmode
__acrt_iob_func
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_register_onexit_function
__p___argv
_crt_atexit
_cexit
_initterm_e
_register_thread_local_exe_atexit_callback
__p___argc
_exit
exit
terminate
_initterm
_initialize_narrow_environment
_configure_narrow_argv
_c_exit
_set_app_type
_seh_filter_exe
_get_initial_narrow_environment
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 564B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ