C:\hisomibirema nomohabojox\wukahaludefun.pdb
Static task
static1
Behavioral task
behavioral1
Sample
282266a783b0eabf4fb074b659100cbeff6534d23bb83adeb3fd84ba43ae3e51.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
282266a783b0eabf4fb074b659100cbeff6534d23bb83adeb3fd84ba43ae3e51.exe
Resource
win10v2004-20241007-en
General
-
Target
d86f9e510c0ead857f54df5407d4e6172372a16c
-
Size
216KB
-
MD5
8674419851acbfc6193768749ff722f1
-
SHA1
d86f9e510c0ead857f54df5407d4e6172372a16c
-
SHA256
68cd81a31fccfb79bc7553f98f66dce5afed15e8515ebc20ab4c25fd7c8ab4e1
-
SHA512
cb78a3c15effdf70cbb313f353c4181df54085f283280e5bb1cb72f6f82aab6b0ca7d32417e6999366f1ad3cb52acc6176a6e8dbbc327e2a5d12c58e2d1cd437
-
SSDEEP
6144:IXqm9cNGSe/a3N+lCq1THoQAk0UlmsT3zovnYlfLSVwX3G:6Xck3/adAd1boQ7LmoMwJSVA2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/282266a783b0eabf4fb074b659100cbeff6534d23bb83adeb3fd84ba43ae3e51
Files
-
d86f9e510c0ead857f54df5407d4e6172372a16c.zip
-
282266a783b0eabf4fb074b659100cbeff6534d23bb83adeb3fd84ba43ae3e51.exe windows:5 windows x86 arch:x86
a3de6a896c379b7dab417ae14fd72612
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadConsoleA
SetMailslotInfo
FreeEnvironmentStringsA
GetConsoleAliasesLengthA
CreateDirectoryExW
GlobalAlloc
LoadLibraryW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
WriteConsoleW
GetBinaryTypeA
ReplaceFileW
LocalHandle
GetSystemDirectoryA
lstrlenW
GetStdHandle
GetCPInfoExW
AllocConsole
BindIoCompletionCallback
GetProcAddress
VirtualAlloc
WriteProfileSectionA
LoadLibraryA
MoveFileA
CreateEventW
SetConsoleWindowInfo
GetModuleHandleA
GetConsoleTitleW
SetCalendarInfoA
SetFilePointer
SetLastError
FindFirstChangeNotificationW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
GetLastError
HeapReAlloc
HeapAlloc
GetModuleHandleW
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
EnterCriticalSection
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
HeapFree
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
FlushFileBuffers
CreateFileA
CloseHandle
user32
ScreenToClient
advapi32
ClearEventLogW
Sections
.text Size: 321KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ