C:\zem\82\ludura-72\duco8_perevezi\golukefekip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e5147ae13310b2b93da17d2800a21956788671c907f7dd19a3918c0b9fcc051b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e5147ae13310b2b93da17d2800a21956788671c907f7dd19a3918c0b9fcc051b.exe
Resource
win10v2004-20241007-en
General
-
Target
b67593dbba8113692794b340bcbf91a8f6ecd17afa359619cfb8c9d7a038ee8a
-
Size
169KB
-
MD5
3b1fe17ff6536027d707a9071eeaa21d
-
SHA1
e560fa642c4428c5d94b17a4c9eb64304c5dd7c6
-
SHA256
b67593dbba8113692794b340bcbf91a8f6ecd17afa359619cfb8c9d7a038ee8a
-
SHA512
658c6502c3bd83c8b8f6e8067bd2a45a7dec0a009660cce1cda5cb49076383bfa09edacf92c2d78465b2a0f3e8b17918ce646822f4583a6f4cce3c8fb802eb7a
-
SSDEEP
3072:Nkz+aTBL5hE702YIzSZ0ZZoVnWBGAOlYVlDCgIhQmnunTLBflE3amYLahG1:Ne+sdhm0jGjQ4BPllaQmneNf5LIy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e5147ae13310b2b93da17d2800a21956788671c907f7dd19a3918c0b9fcc051b.exe
Files
-
b67593dbba8113692794b340bcbf91a8f6ecd17afa359619cfb8c9d7a038ee8a.zip
Password: infected
-
e5147ae13310b2b93da17d2800a21956788671c907f7dd19a3918c0b9fcc051b.exe.exe windows:5 windows x86 arch:x86
bb1da332f7212d9c576b80377a6c6ffb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateHardLinkA
CallNamedPipeW
GetCommConfig
GetConsoleAliasesA
GetWindowsDirectoryA
GlobalAlloc
WideCharToMultiByte
LoadLibraryW
GetStringTypeExW
GetExitCodeProcess
lstrcpynW
GetFileAttributesW
LocalReAlloc
WriteConsoleW
GetBinaryTypeW
SetLastError
GetProcAddress
VirtualAlloc
OpenJobObjectA
EnumSystemCodePagesW
GetFileType
CreateEventW
EnumDateFormatsA
FreeEnvironmentStringsW
GetPrivateProfileSectionA
GetStringTypeW
FindAtomW
DeleteTimerQueueTimer
GlobalAddAtomW
OpenFileMappingA
LCMapStringW
HeapSize
GetStartupInfoW
HeapAlloc
GetLastError
HeapFree
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetModuleHandleA
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetLocaleInfoA
user32
InvalidateRgn
CreateMDIWindowA
LoadMenuW
GetMenuInfo
NotifyWinEvent
gdi32
GetGlyphIndicesA
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 38.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ