C:\wanok\vehudezepedu-jutiyotaru\pod_lihusit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2815c7fda26e891ef2b0b29f223604415b1d6dec8bd551c2d96c2b3ac795a001.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2815c7fda26e891ef2b0b29f223604415b1d6dec8bd551c2d96c2b3ac795a001.exe
Resource
win10v2004-20240802-en
General
-
Target
4d758c029f6a05e90ea16aa333e3971c.zip
-
Size
141KB
-
MD5
512508c03805a968949b5ae3f5f44f48
-
SHA1
2790f04cf8e33b3def7e79c99acfc840aded7c7f
-
SHA256
27acf967a7733160f315258b6008d1da398bec342fdb055f6b4e0229d17b9e3b
-
SHA512
bc27b0a96ce9438ddfbf3dc53f1cff66021af1e76f35cd7bcddead3c21820a38def95df5ba6dc8f5e760a9a98dd25d7db9c601ad55cc8b5a9de2f8cad8b0d4e7
-
SSDEEP
3072:Skyw8pMquY5VZZ1YZ1TKSHkPYK8Gu2Mg6C7XM3bIO:l+MquY55cOSmDu23rub/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2815c7fda26e891ef2b0b29f223604415b1d6dec8bd551c2d96c2b3ac795a001
Files
-
4d758c029f6a05e90ea16aa333e3971c.zip.zip
Password: infected
-
2815c7fda26e891ef2b0b29f223604415b1d6dec8bd551c2d96c2b3ac795a001.exe windows:5 windows x86 arch:x86
Password: infected
c8c17e47eb07afabbfe8e635fca5ad02
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
UnmapViewOfFile
EndUpdateResourceW
ReadConsoleA
GetCurrentProcess
BackupSeek
FindActCtxSectionStringA
GetEnvironmentStrings
GlobalAlloc
Sleep
InitAtomTable
HeapDestroy
FindNextVolumeW
WriteConsoleW
GetModuleFileNameW
CreateActCtxA
GetACP
ReleaseSemaphore
SetTapePosition
SetLastError
GetProcAddress
BeginUpdateResourceW
ResetEvent
DebugSetProcessKillOnExit
CreateIoCompletionPort
GetModuleHandleA
GetProcessShutdownParameters
VirtualProtect
GetCurrentProcessId
FindNextVolumeA
LCMapStringW
lstrcpyA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetLastError
HeapFree
SetFilePointer
CloseHandle
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetOEMCP
IsValidCodePage
WideCharToMultiByte
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
RaiseException
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
HeapSize
CreateFileW
Exports
Exports
@GetFirstVice@8
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nocemi Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dofu Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 63KB - Virtual size: 415KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ