C:\Users\dev-c\OneDrive\Desktop\Abood\Stealer-New\LastUpdate\try_2\Release\try.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7c17416063fed1326321d220e18cabc48ff88c49d5d4aa220f0ebf7846c29e5d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7c17416063fed1326321d220e18cabc48ff88c49d5d4aa220f0ebf7846c29e5d.exe
Resource
win10v2004-20240802-en
General
-
Target
eb7329d18dd23a237cfd3f0daebfd27e.bin
-
Size
1.4MB
-
MD5
c794b65de59a316bc7d1c9204d3260e7
-
SHA1
ab5508b8ceb1a85383cbdd743a3bfafd784c5ca1
-
SHA256
0ddacba3ad9dd45a790e0b89bacb74eb19b1ea53f62a1cb872615b99a543e397
-
SHA512
134cfefa327997e590de2eb2d57dd7be0614ac7f18e58550724836564fbed057340192ce6956ca9ded5f5376c56c59ed56979d15b3cf1d14ed5e181f8b5da2fb
-
SSDEEP
24576:IcsuWj1q0mwkk5I3HorNoGoKRwHyYna9G9EriTOQJC6kFNNlJdhATWr5ki5x:Icsj5xV+3CQKRwBLBTO6kTNlJdhATY1/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7c17416063fed1326321d220e18cabc48ff88c49d5d4aa220f0ebf7846c29e5d.exe
Files
-
eb7329d18dd23a237cfd3f0daebfd27e.bin.zip
Password: infected
-
7c17416063fed1326321d220e18cabc48ff88c49d5d4aa220f0ebf7846c29e5d.exe.exe windows:6 windows x86 arch:x86
Password: infected
8cebf89073c7068aeafca2a169678980
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
SelectObject
BitBlt
GetDIBits
DeleteDC
GetObjectW
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
bcrypt
BCryptOpenAlgorithmProvider
BCryptGetProperty
BCryptCloseAlgorithmProvider
BCryptCreateHash
BCryptHashData
BCryptFinishHash
BCryptGenRandom
BCryptDestroyHash
user32
ReleaseDC
GetDesktopWindow
wsprintfW
GetWindowRect
GetDC
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysFreeString
VariantInit
kernel32
GetShortPathNameW
DeviceIoControl
TerminateProcess
GetModuleFileNameW
K32GetModuleFileNameExW
GetEnvironmentVariableW
InitializeCriticalSectionEx
CreateFileW
OpenProcess
SetCurrentDirectoryA
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
GetLastError
Process32NextW
CreateFileA
GetDiskFreeSpaceExW
LoadLibraryA
lstrcatW
LockResource
GlobalAlloc
Process32FirstW
GlobalFree
CloseHandle
LoadResource
FindResourceW
K32EnumProcesses
DecodePointer
GetProcAddress
GlobalLock
LocalFree
DeleteCriticalSection
CreateProcessW
WideCharToMultiByte
lstrcpyW
GlobalUnlock
GetVolumeInformationByHandleW
GetSystemTimeAsFileTime
GetModuleHandleA
FormatMessageW
VerSetConditionMask
VerifyVersionInfoW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
GetThreadTimes
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SetEvent
WaitForSingleObject
CreateEventW
GetSystemDirectoryW
FreeLibrary
GetModuleHandleW
LoadLibraryW
SleepEx
MoveFileExW
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
GetFileType
PeekNamedPipe
WaitForMultipleObjects
GetCurrentProcessId
GetFileSizeEx
FlushFileBuffers
MapViewOfFile
CreateFileMappingW
FormatMessageA
GetSystemTime
SystemTimeToFileTime
GetProcessHeap
GetFileSize
LockFileEx
UnlockFile
HeapDestroy
HeapCompact
HeapAlloc
GetSystemInfo
HeapReAlloc
DeleteFileW
DeleteFileA
FlushViewOfFile
OutputDebugStringW
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapSize
HeapValidate
FindFirstFileW
GetFileAttributesW
CreateMutexW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
WriteFile
GetFullPathNameW
HeapFree
HeapCreate
AreFileApisANSI
RaiseException
InitializeCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
SetFileInformationByHandle
CopyFileW
GetFileInformationByHandleEx
CreateSymbolicLinkW
IsProcessorFeaturePresent
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
GetLocaleInfoEx
WakeAllConditionVariable
SleepConditionVariableSRW
InitOnceComplete
InitOnceBeginInitialize
GetStringTypeW
TryAcquireSRWLockExclusive
LCMapStringEx
EncodePointer
CompareStringEx
GetCPInfo
CreateThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibraryAndExitThread
LoadLibraryExW
GetCurrentProcess
InitializeSListHead
InterlockedPushEntrySList
IsDebuggerPresent
SetUnhandledExceptionFilter
SizeofResource
ReadFile
GetStartupInfoW
RtlUnwind
InitializeCriticalSectionAndSpinCount
ExitProcess
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitThread
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
UnhandledExceptionFilter
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
SetStdHandle
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FindNextFileW
UnmapViewOfFile
WriteConsoleW
advapi32
RegQueryValueExW
RegGetValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
OpenThreadToken
CryptAcquireContextW
CryptReleaseContext
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
CryptGetHashParam
CryptCreateHash
shell32
ShellExecuteW
SHGetFolderPathW
crypt32
CertEnumCertificatesInStore
CryptStringToBinaryW
CertOpenStore
CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateContext
CryptUnprotectMemory
CryptUnprotectData
CertFreeCertificateChainEngine
PFXImportCertStore
CertFindCertificateInStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringW
CryptQueryObject
CertCloseStore
CertCreateCertificateChainEngine
ws2_32
gethostname
ioctlsocket
ntohs
sendto
recvfrom
freeaddrinfo
getaddrinfo
listen
htonl
accept
select
__WSAFDIsSet
WSAIoctl
socket
setsockopt
recv
WSACreateEvent
inet_pton
WSAGetLastError
WSASetLastError
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
inet_ntop
WSACloseEvent
send
getsockopt
WSAStartup
WSACleanup
bind
connect
getpeername
getsockname
htons
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
winhttp
WinHttpReceiveResponse
WinHttpQueryAuthSchemes
WinHttpQueryHeaders
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpSetTimeouts
WinHttpSetOption
WinHttpQueryOption
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpWriteData
WinHttpSetCredentials
WinHttpSetStatusCallback
WinHttpGetDefaultProxyConfiguration
WinHttpOpen
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 397KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 81KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ