C:\lexik_jubideno mufisar.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2654475cea33d0b2cdec44ffff6290b987d5de1d0be3fa7a53bbd93b6bce28c9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2654475cea33d0b2cdec44ffff6290b987d5de1d0be3fa7a53bbd93b6bce28c9.exe
Resource
win10v2004-20241007-en
General
-
Target
e0c5b2f78ed68289375f3386e564c41fb1cba2a945aeaa4ba6c84f4e147ada82
-
Size
151KB
-
MD5
9215e4ab207c3f27d33e975c72562b73
-
SHA1
61e6c6355a233fa725897b322824d191b2cd6bef
-
SHA256
e0c5b2f78ed68289375f3386e564c41fb1cba2a945aeaa4ba6c84f4e147ada82
-
SHA512
8b763af0e98f42c05f31d28b0eeab58a224966ecc75afc6e5ca4d91e2296bee480459f6cd0adfc4c29fca6a6964c8fa421b15ced0081839fdd1732d9fc937a53
-
SSDEEP
3072:THx9lREnEMD4NpB6mGM44yTU9p7ptaZKnWYzt/ADpSJBCERx2vXyK63Qm:rEEMD4NxGz4yI1UZKnfiDERx2It
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2654475cea33d0b2cdec44ffff6290b987d5de1d0be3fa7a53bbd93b6bce28c9
Files
-
e0c5b2f78ed68289375f3386e564c41fb1cba2a945aeaa4ba6c84f4e147ada82.zip
-
2654475cea33d0b2cdec44ffff6290b987d5de1d0be3fa7a53bbd93b6bce28c9.exe windows:5 windows x86 arch:x86
8dc952aad89199c54629c246576ee419
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateDirectoryExA
ReadConsoleInputA
GetTempPathW
GetSystemDirectoryW
RemoveDirectoryA
OutputDebugStringW
GetProcAddress
LocalAlloc
ExitThread
FindResourceA
LoadModule
InterlockedDecrement
RemoveVectoredExceptionHandler
lstrcatA
GetBinaryTypeW
SearchPathW
VerifyVersionInfoW
CopyFileExW
EndUpdateResourceA
GetModuleHandleW
FindFirstVolumeA
LocalShrink
LocalFlags
_llseek
UpdateResourceW
CreateActCtxW
CopyFileA
FindFirstFileW
FreeEnvironmentStringsW
EnumResourceLanguagesW
InterlockedIncrement
MoveFileWithProgressW
GetModuleHandleA
GetTickCount
SetLastError
GetPrivateProfileStructW
AddConsoleAliasA
GetConsoleAliasA
FindNextFileA
LoadLibraryA
GetLastError
HeapReAlloc
HeapAlloc
DeleteFileA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
CreateFileA
CloseHandle
FlushFileBuffers
user32
CharUpperBuffW
gdi32
SetBrushOrgEx
advapi32
AccessCheckByType
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ