C:\c_code\helper\windows\executer\Release\executer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6cff88866cd49d0853c99c44f29fb901264bdb7e79d3fd13db04dd1fa2f15ece.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6cff88866cd49d0853c99c44f29fb901264bdb7e79d3fd13db04dd1fa2f15ece.exe
Resource
win10v2004-20240802-en
General
-
Target
61997ebe55e2d0d94813c7cbf4eed8da.zip
-
Size
28KB
-
MD5
fa283e8ca12414fcb4ed72b6e400d984
-
SHA1
b4da44fc9700a9ae48d54d43fc408f3db0b74fea
-
SHA256
9d72431390a6091ebb8c2b5ad75ff724b0865fd5313aa7d1e1be0b73fa673e23
-
SHA512
d3fbe91e6194bd527806aa1c5472f9c768aaab08116ce5b3a6680332cd4a9afd5183e8506046433eb6efb1f88154bb6b987857555c289fdeac00d76acfdcb5db
-
SSDEEP
768:AfNylGwvA9VBDeHkOyZ5ibyyWV+7nEgl5Udy:aN6PvA9OkOq5ibu+QgT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6cff88866cd49d0853c99c44f29fb901264bdb7e79d3fd13db04dd1fa2f15ece
Files
-
61997ebe55e2d0d94813c7cbf4eed8da.zip.zip
Password: infected
-
6cff88866cd49d0853c99c44f29fb901264bdb7e79d3fd13db04dd1fa2f15ece.exe windows:6 windows x86 arch:x86
Password: infected
742aceb7bf14064f81e7946ab54f9e12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcessHeap
GetExitCodeProcess
Sleep
GetModuleFileNameW
CreateProcessW
GetModuleHandleW
CopyFileW
GetTickCount
MoveFileW
HeapAlloc
0
G
�P}H���1�)9�
z
C
CreateThread
CloseHandle
TerminateThread
GetLastError
WaitForSingleObject
CreateFileW
WriteFile
GetCurrentProcess
HeapFree
GetStdHandle
SetConsoleTextAttribute
GetVersionExW
CreateDirectoryW
user32
wsprintfW
SendInput
ReleaseDC
GetSystemMetrics
FindWindowW
SendMessageW
GetDC
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
DeleteObject
BitBlt
advapi32
RegOpenKeyExW
RegQueryValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
shlwapi
PathFileExistsW
PathRemoveFileSpecW
PathFindFileNameW
Gd
GdipDisposeImage
GdipGetImageEncodersSize
GdipSaveImageToFile
PY0J���~�W4��
4��
$"
PY0J���~�W4��
��@�)�Robin
$
��
in
�
�
�
L
A
�)9�
�1�)9
1C�̣���8
u�n
j
P}H���1�)9�
9�
d
͇r���U
�"S���K�����D�
��o
��D�
r
������
\
R
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 892B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ