Static task
static1
Behavioral task
behavioral1
Sample
Backdoor.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Backdoor.exe
Resource
win10v2004-20240802-en
General
-
Target
Backdoor.exe
-
Size
36KB
-
MD5
7adbf0695e6b3744e4f800c4d5ea9302
-
SHA1
c64d7721fae66e49c9e88a6e5effcc0ca9501d37
-
SHA256
e639fcadaec03de9703201cd5ed26ee2bb56a698c49e662dd7b6edab6accbe69
-
SHA512
719bd2eecccd929eac4faf3c121940548a8e732695e0bd890f97705cbb0d56b2f65553b822b20e48aaefa58d975ea1a6d70b5fffe65ae54595d14a8d00012c8b
-
SSDEEP
768:uNnmZ/8vPlLUdhfJ8v6utFpVsOHjPgpG5o7D11ar1:Anwu4DejVdiG5ysr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Backdoor.exe
Files
-
Backdoor.exe.exe windows:4 windows x86 arch:x86
Password: 3434
d01b793cfeabb1210a9dfd924e5cbf0d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
user32
SendInput
gdi32
DeleteDC
advapi32
RegCloseKey
shell32
ExtractIconA
msvcp60
??0_Winit@std@@QAE@XZ
msvcrt
_iob
winmm
waveInOpen
shlwapi
PathFileExistsA
ws2_32
htons
urlmon
URLDownloadToFileA
gdiplus
GdipFree
wininet
InternetOpenA
Sections
.MPRESS1 Size: 28KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE