Behavioral task
behavioral1
Sample
abf4910e33aafff7152c179aaeea56b144530093e3918e82c548d7627ac99217.exe
Resource
win7-20240903-en
General
-
Target
abf4910e33aafff7152c179aaeea56b144530093e3918e82c548d7627ac99217
-
Size
3.2MB
-
MD5
4fb7da99fc2102b481dfee0b95f96b90
-
SHA1
c6637560e4ac197bd1ebdf5e6b394fc1c335a942
-
SHA256
abf4910e33aafff7152c179aaeea56b144530093e3918e82c548d7627ac99217
-
SHA512
1c94f40ad2a48f22caf380df34dd1ce4036bbb733e6b5679a6063e868d7a53621433a5d789451b2c5d5eefe78064229f832bd3f7cf47b774c04b489ffa1d31c0
-
SSDEEP
49152:hhSNGMwVbnURJs4hrqLDBttkL6R6JEl4EQo5AzwwxYXjqkNRfDUcDd+XFVD:hyezUUImLjfR6JeQyAsXJNRrNhcFVD
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abf4910e33aafff7152c179aaeea56b144530093e3918e82c548d7627ac99217
Files
-
abf4910e33aafff7152c179aaeea56b144530093e3918e82c548d7627ac99217.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 470KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 232KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 28KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 11KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imports Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
1��I�u� Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE