ftp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0b2a865106f292c4180e56c0b51badb6cb3188aee7604dd31aa07102dcf228d6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b2a865106f292c4180e56c0b51badb6cb3188aee7604dd31aa07102dcf228d6.exe
Resource
win10v2004-20241007-en
General
-
Target
0b2a865106f292c4180e56c0b51badb6cb3188aee7604dd31aa07102dcf228d6
-
Size
201KB
-
MD5
de421476eccbfe47f7687ed8d5cca7f5
-
SHA1
6d2809fbc1377d87b137e91f01dae572dff2a82d
-
SHA256
0b2a865106f292c4180e56c0b51badb6cb3188aee7604dd31aa07102dcf228d6
-
SHA512
5996599d5ee425aa3bc857ad5ea4c800d50e6487d882d0c062da22cc62017e08f18a96a465ee872882d701461602b11c9d749721b065f4d694d7f402add4d5a1
-
SSDEEP
768:R3c3OePgOC9SVpb9Re1yJud4BkotWghy7VvEHsKCXaIcoUhMM:Bc3Og5CkDWc8NEHsKCXtdUOM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b2a865106f292c4180e56c0b51badb6cb3188aee7604dd31aa07102dcf228d6
Files
-
0b2a865106f292c4180e56c0b51badb6cb3188aee7604dd31aa07102dcf228d6.exe windows:5 windows x86 arch:x86
72461fdf0a8e4b6e7a91d2e92630e1e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
isdigit
sprintf
_write
strchr
_setjmp3
_isatty
clearerr
putchar
tolower
longjmp
exit
islower
toupper
_chdrive
fprintf
_errno
_getcwd
fflush
_mbslen
_mbsnbcnt
_mbsnbcat
printf
getenv
_tempnam
tmpnam
_mbsnbcpy
free
fopen
_unlink
vsprintf
vfprintf
_read
clock
_fstat
_fsopen
_c_exit
_exit
_XcptFilter
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
_chdir
_cexit
fclose
_mbscmp
_mbscpy
_mbscat
_mbstrlen
_iob
fgets
_mbschr
atoi
advapi32
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
kernel32
ReadFile
GetConsoleMode
CreateFileA
Sleep
WriteFile
SetConsoleMode
HeapFree
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
HeapAlloc
FindFirstFileA
FindNextFileA
InterlockedExchange
IsDBCSLeadByteEx
GetEnvironmentVariableA
CreateProcessA
WaitForSingleObject
CloseHandle
LoadLibraryExA
GetLastError
GetCurrentDirectoryA
SetConsoleCtrlHandler
GetFileAttributesA
LocalFree
LocalAlloc
FormatMessageA
GetProcessHeap
user32
CharToOemBuffA
OemToCharBuffA
CharNextExA
ws2_32
getnameinfo
ntohs
setsockopt
send
accept
select
__WSAFDIsSet
recv
WSAStartup
getservbyname
socket
WSAGetLastError
htonl
bind
getsockname
connect
shutdown
closesocket
htons
gethostname
getaddrinfo
freeaddrinfo
listen
mswsock
s_perror
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE