D:\re\bin\Debug\rwdec_x86_debug.pdb
Behavioral task
behavioral1
Sample
8080d316900d5c40526b1508e7db34719d0205017901cd7da5f7a99914eb5c28.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8080d316900d5c40526b1508e7db34719d0205017901cd7da5f7a99914eb5c28.exe
Resource
win10v2004-20240802-en
General
-
Target
9ca75a6de8a2425ef23127633042e5d3.zip
-
Size
43KB
-
MD5
081262b75fa60f8024aca2af2e8dd26e
-
SHA1
997aaba8a7bb9e9f41c255b9b3715b06b69301a2
-
SHA256
c63fce74fead4028762dbcab1a33d67be4478b35aac99ccb64ff6ba89b92851c
-
SHA512
699e38ec59b96874858d03dea1c9004cb21e007da52c2dbb9f22102c5c97a74751a5df17c7bf41274a15a65d56973c34fed73fe01bb0df523880791e1bfb4b5c
-
SSDEEP
768:KiEABE865cIyvDiOMC3YTtYQmcSSiz6JnWY0gvjHSN93ZQbweA4v0b:Bl65cXDiOR3WOcSSizyp1vjCWweA3b
Malware Config
Signatures
-
Sodinokibi family
-
Sodinokibi/Revil sample 1 IoCs
resource yara_rule static1/unpack001/8080d316900d5c40526b1508e7db34719d0205017901cd7da5f7a99914eb5c28 family_sodinokobi -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/8080d316900d5c40526b1508e7db34719d0205017901cd7da5f7a99914eb5c28
Files
-
9ca75a6de8a2425ef23127633042e5d3.zip.zip
Password: infected
-
8080d316900d5c40526b1508e7db34719d0205017901cd7da5f7a99914eb5c28.exe windows:5 windows x86 arch:x86
Password: infected
1e6452b349d3cbc048e72755b22f42e0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
CreateThread
GetModuleHandleW
CopyFileW
MoveFileW
GetStdHandle
CreateFileW
WriteFile
OutputDebugStringW
QueryPerformanceCounter
QueryPerformanceFrequency
HeapAlloc
SetEndOfFile
GetProcessHeap
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetCurrentThread
GetProcAddress
SetThreadAffinityMask
lstrlenW
LoadLibraryA
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
WriteConsoleW
DeleteFileW
LeaveCriticalSection
HeapFree
EnterCriticalSection
IsProcessorFeaturePresent
user32
CheckDlgButton
IsDlgButtonChecked
EnableWindow
SetDlgItemTextW
DialogBoxParamW
SendMessageW
SetDlgItemInt
GetDlgItem
SetWindowTextW
wsprintfW
MessageBoxW
EndDialog
gdi32
CreateFontW
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
comdlg32
GetOpenFileNameW
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.iwpd Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ