Static task
static1
Behavioral task
behavioral1
Sample
a8f226bdf5acaaeb3a8a021b70a54faf903147f7428cd84fc8a76cc2cffdfa4f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a8f226bdf5acaaeb3a8a021b70a54faf903147f7428cd84fc8a76cc2cffdfa4f.exe
Resource
win10v2004-20240802-en
General
-
Target
483505b47371341b7b47cccb6c8af87c.zip
-
Size
55KB
-
MD5
507eeb2e7608dde8a4da82dda04732b1
-
SHA1
db0df216317ee8e94812a17e35d9ffa16cb7c8d2
-
SHA256
284eb33e05c9f11c49f1cf0699efb72b0c6303f0446ef1f1231c79c12580e60f
-
SHA512
e7712440398079bbafe58669355a4eec687f91d7cc48ff587b809e9b784caa4df07703ee28ded9fbc78634e63be3986725a4e2975dd37e05cdc4aeb90135f6d4
-
SSDEEP
1536:/D03OlLcfQvMm2XgW7SUH0NmaJrozgIC2wSGEtc:/Q+lLV12XgaSqN0IHZGEtc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a8f226bdf5acaaeb3a8a021b70a54faf903147f7428cd84fc8a76cc2cffdfa4f
Files
-
483505b47371341b7b47cccb6c8af87c.zip.zip
Password: infected
-
a8f226bdf5acaaeb3a8a021b70a54faf903147f7428cd84fc8a76cc2cffdfa4f.exe windows:6 windows x64 arch:x64
Password: infected
0da19a3ce7222cb0aeb5e48884a5cccc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptHashData
BCryptDestroyHash
BCryptFinishHash
BCryptCreateHash
BCryptEncrypt
BCryptDuplicateHash
BCryptDestroyKey
BCryptGenRandom
BCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptSecretAgreement
BCryptImportKeyPair
BCryptDestroySecret
BCryptDeriveKey
BCryptExportKey
BCryptImportKey
crypt32
CryptDecodeObject
CryptBinaryToStringA
CryptStringToBinaryA
ws2_32
closesocket
gethostbyname
WSAStartup
send
socket
WSACleanup
recv
htons
setsockopt
WSAGetLastError
inet_addr
connect
inet_ntoa
secur32
InitSecurityInterfaceA
kernel32
CreateThread
TerminateThread
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObject
FlushFileBuffers
GetFileSize
CreateFileA
GetFileAttributesA
SetFilePointer
GetModuleFileNameA
Sleep
GetConsoleWindow
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetStdHandle
GetCurrentThreadId
GetLocalTime
GetTickCount
GetCommandLineW
LocalFree
GetEnvironmentVariableA
LoadLibraryA
ReadFile
WriteFile
user32
ShowWindow
advapi32
RegSetValueExA
RegOpenKeyExA
CryptAcquireContextA
CryptReleaseContext
RegCloseKey
RegQueryInfoKeyA
RegEnumValueA
shell32
CommandLineToArgvW
msvcrt
__CxxFrameHandler3
atexit
vprintf
free
malloc
vsprintf_s
_vscprintf
sscanf
_mkgmtime
time
wcstombs
memmove
memchr
memcmp
memcpy
memset
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ