C:\pasudacizub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ed41aca05ddd6f4be992f5da7f21d48b1e142298a45e3c8b32cb6a6b3d9f7183.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed41aca05ddd6f4be992f5da7f21d48b1e142298a45e3c8b32cb6a6b3d9f7183.exe
Resource
win10v2004-20241007-en
General
-
Target
957a38b426a6bbdddd24ea0d0a36863a85ce39f9c1991ee2a92d5596687e993a
-
Size
308KB
-
MD5
7bd19a69dcf7b8a6046ebe75404fcb27
-
SHA1
7b801d4ecb46dd3386c34b0e50663b377aae9c7f
-
SHA256
957a38b426a6bbdddd24ea0d0a36863a85ce39f9c1991ee2a92d5596687e993a
-
SHA512
fd7d4b1863c63f0136a8a0958c4de5f9f8bd4ef3d926b9c422c10745918010345b7bd379b8c8be763300ee6877278733f1960f1a6d9dd646dffff902d0914978
-
SSDEEP
6144:q6bZtIVDjY9ioHDTcMYYjboYjikO/sbI8utwlC7n7ZmbKL5Wlv2HAyKtrn3Vq:q6bZtijYVjTcMYYoYCGIjGw7nYb1lv2H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ed41aca05ddd6f4be992f5da7f21d48b1e142298a45e3c8b32cb6a6b3d9f7183.exe
Files
-
957a38b426a6bbdddd24ea0d0a36863a85ce39f9c1991ee2a92d5596687e993a.zip
Password: infected
-
ed41aca05ddd6f4be992f5da7f21d48b1e142298a45e3c8b32cb6a6b3d9f7183.exe.exe windows:5 windows x86 arch:x86
3ff0b1e3f0f47a57638794530d5c6447
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindResourceExW
InterlockedIncrement
GetConsoleAliasA
GetComputerNameW
EnumCalendarInfoExW
GetWindowsDirectoryA
GetGeoInfoW
GlobalAlloc
LoadLibraryW
SetCommConfig
HeapCreate
LCMapStringA
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
EnumSystemCodePagesW
BuildCommDCBW
GetCPInfo
LoadLibraryA
DnsHostnameToComputerNameA
AddAtomW
CreateEventW
GetCommMask
SetNamedPipeHandleState
SetConsoleCursorInfo
lstrcmpiW
GetModuleHandleA
GetCommTimeouts
VirtualProtect
EndUpdateResourceA
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
GetConsoleProcessList
LCMapStringW
GetStringTypeW
IsBadStringPtrW
GetConsoleAliasExesA
CreateFiber
MultiByteToWideChar
GetStringTypeA
HeapAlloc
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
WideCharToMultiByte
user32
GetCaretPos
GetMenuItemID
LoadMenuA
gdi32
GetCharWidthA
advapi32
BackupEventLogA
winhttp
WinHttpOpen
msimg32
AlphaBlend
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yocozi Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ducicac Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fohemiv Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ