C:\Users\intel\Downloads\AVB\AVB\AVB\obj\Debug\AVB.pdb
Behavioral task
behavioral1
Sample
95246179cf7c6c8d3629dd30eb1b76bfff221c82915eed1b77c05daa8c5a0afc.exe
Resource
win7-20240708-en
General
-
Target
03778d811f241e83ccad830372313b3c.zip
-
Size
6.0MB
-
MD5
cb5f90bc4f6b3efb5a8d8d96919922fb
-
SHA1
2957561a29587d510fd9a40e479416c80203cd6c
-
SHA256
75a58e896b1e5f70dceb2bc8e189ec19f600cb2df28196af4ba05711bea7ce3f
-
SHA512
80d32637b5f660704b182c94a17a668aad0686b5fe3c7aa70dc66b1d9c7815d7e73ecbe29ce0cec09ce9ad421dce58f24a723d48acd4f2fa486fc913412dd027
-
SSDEEP
98304:Yvo1nQ0HP4N8GMZbAOr6/uWM3OY6vqQMOpoT4YOYDGAZfkSJJVjnhRD2wOMTjnXK:SoJQ+P4be9r3z6iQMuYDTKKDjnhpTLXK
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule static1/unpack001/95246179cf7c6c8d3629dd30eb1b76bfff221c82915eed1b77c05daa8c5a0afc agile_net -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/95246179cf7c6c8d3629dd30eb1b76bfff221c82915eed1b77c05daa8c5a0afc
Files
-
03778d811f241e83ccad830372313b3c.zip.zip
Password: infected
-
95246179cf7c6c8d3629dd30eb1b76bfff221c82915eed1b77c05daa8c5a0afc.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 6.1MB - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ