C:\pupik\foxaxa\kotibub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d4d348f0d44e134f3de5e7184503e3de21008a37.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4d348f0d44e134f3de5e7184503e3de21008a37.exe
Resource
win10v2004-20241007-en
General
-
Target
d4d348f0d44e134f3de5e7184503e3de21008a37
-
Size
274KB
-
MD5
98c68e38c6cfaf0e265a103745a6daca
-
SHA1
d4d348f0d44e134f3de5e7184503e3de21008a37
-
SHA256
d53cb67ec600560fd6b01d2cb3470d3733547c604b0a2ac1c599c87c8b3ec4d0
-
SHA512
cfdbf2fe3d1ea573cb8d4d16c8f2da3ed40585dc8f858d4e249edb6918d4464f5b2c3cd3d2aab9f27e9fb4051b2bf3b97d8eb66960ed5b24e40a3e6e93f68d63
-
SSDEEP
6144:5NqoauISKJHzC6fAFr0URO19WXl3iyvbgMDPGu5Y:5qVSKJH4oURE9KlyyjX5Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4d348f0d44e134f3de5e7184503e3de21008a37
Files
-
d4d348f0d44e134f3de5e7184503e3de21008a37.exe windows:5 windows x86 arch:x86
4ae346efbd980e81090bb35a433471a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindNextFileW
CopyFileExA
VerifyVersionInfoA
ReadConsoleOutputCharacterW
FlushConsoleInputBuffer
UnlockFile
GetProfileSectionA
QueryDosDeviceW
IsSystemResumeAutomatic
SetProcessPriorityBoost
GlobalGetAtomNameA
lstrlenA
FindNextVolumeMountPointW
GlobalDeleteAtom
WriteConsoleInputW
FindResourceA
GetComputerNameExW
OpenEventA
CallNamedPipeA
GetModuleHandleA
GetSystemDirectoryA
GetCurrentDirectoryW
BuildCommDCBAndTimeoutsA
GetProcAddress
MoveFileWithProgressW
GetCommandLineA
GetCalendarInfoW
SearchPathA
CreateActCtxW
FormatMessageA
InitializeCriticalSection
GetSystemDefaultLangID
GetConsoleAliasesLengthA
WriteProfileSectionW
AddAtomA
InterlockedIncrement
HeapSize
_hread
InterlockedExchangeAdd
GetStartupInfoA
CreateMailslotW
MultiByteToWideChar
GetSystemWow64DirectoryA
GetLastError
GetConsoleAliasExesLengthA
DebugBreak
GetTickCount
LoadLibraryW
EnumDateFormatsW
GetDefaultCommConfigA
GetConsoleAliasesLengthW
GetModuleHandleW
VirtualAlloc
GetMailslotInfo
GetDiskFreeSpaceExA
WriteConsoleW
SetLastError
GetComputerNameA
EnumSystemLocalesA
DeleteCriticalSection
LocalFileTimeToFileTime
SearchPathW
GetComputerNameExA
FindNextFileA
ResetEvent
CreateMutexA
FindResourceW
SetCommState
FormatMessageW
CreateFiber
GetConsoleSelectionInfo
LockFile
LocalAlloc
GetFileSizeEx
HeapAlloc
GetFileAttributesA
GetSystemWindowsDirectoryA
GetAtomNameA
GetComputerNameW
ReadConsoleInputA
GetPrivateProfileStructW
_hwrite
GetConsoleAliasA
OpenWaitableTimerA
FillConsoleOutputCharacterW
FindNextVolumeMountPointA
PrepareTape
AddAtomW
SetCurrentDirectoryW
SetCalendarInfoW
FlushFileBuffers
CloseHandle
CreateFileA
LoadLibraryA
LocalFlags
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
Sleep
InterlockedDecrement
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapReAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
OutputDebugStringW
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
user32
GetCursorInfo
GetMenuInfo
GetMenuItemID
LoadMenuW
CharUpperW
GetListBoxInfo
advapi32
AbortSystemShutdownW
Sections
.text Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ