Behavioral task
behavioral1
Sample
30ce6f5e51fb01b94a7d30d11d7e5cef932264d87f87d35837623b28ed3fc8aa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30ce6f5e51fb01b94a7d30d11d7e5cef932264d87f87d35837623b28ed3fc8aa.exe
Resource
win10v2004-20240802-en
General
-
Target
30ce6f5e51fb01b94a7d30d11d7e5cef932264d87f87d35837623b28ed3fc8aa
-
Size
11.6MB
-
MD5
88f1d464b3a95bf5a762e361b27f675f
-
SHA1
70606230d448803324f36882505c7247e0e1cba0
-
SHA256
30ce6f5e51fb01b94a7d30d11d7e5cef932264d87f87d35837623b28ed3fc8aa
-
SHA512
0ae9e2d42eb4046469b660cde270955c0feda43838e7633685e941a74561d4923691050dcbe3fe073322f74a8a232dc6ecdac64d0f479811e1abee8594ffa55b
-
SSDEEP
196608:4yW0TLdJ3v2GWVAKcZkBZsUrnZ3+P4G4X2mILklcrk9+tAnQ:4e9dv2tVAKfjDkP4Ga2mx9k
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30ce6f5e51fb01b94a7d30d11d7e5cef932264d87f87d35837623b28ed3fc8aa
Files
-
30ce6f5e51fb01b94a7d30d11d7e5cef932264d87f87d35837623b28ed3fc8aa.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 692KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1.2MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 28KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 16KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 14.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 9.6MB - Virtual size: 9.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ