General

  • Target

    runasadmin.exe

  • Size

    70KB

  • MD5

    3547b187ebf0f53dbb04ccdcb1043ba2

  • SHA1

    4d496028cf6fafc1209d1f7c75f7c6b5c9b82f54

  • SHA256

    78a3c44e3d0095dc0ae6aa337f907d45462c562398e8469348cae8719b7e1a9f

  • SHA512

    49039ac95f47aa60ed7d463090c1f487f8b15e57c2bbfa061fe535a9d6b45cb5f56c21a0c700e2f8f89950e49a792b0de5b89d072cab0842c5c6e6a8652a1616

  • SSDEEP

    1536:dfHLrLkSRoybCQUZsrs0DC1cuH4Romu/T4gw16omFRT+q3i20GBsoq:dfr3k+o5buDC1cuH45RglFRqq3i2jLq

Score
3/10

Malware Config

Signatures

  • Unsigned PE 4 IoCs

    Checks for missing Authenticode signature.

Files

  • runasadmin.exe
    .exe windows:4 windows x86 arch:x86

    Password: 123

    f4639a0b3116c2cfc71144b88a929cfd


    Headers

    Imports

    Sections

  • $PLUGINSDIR/System.dll
    .dll windows:4 windows x86 arch:x86

    Password: 123

    509a34b3a68a773e0afb4259e68f9f82


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/modern-wizard.bmp
  • $PLUGINSDIR/nsDialogs.dll
    .dll windows:4 windows x86 arch:x86

    Password: 123

    3b477381217c97b22146297f93df2a92


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/nsExec.dll
    .dll windows:4 windows x86 arch:x86

    Password: 123

    68b7023f8923dd087549802f8fa631c3


    Headers

    Imports

    Exports

    Sections