C:\yakoxid-vuxe\waxewudek31 migoyeyepajoco\digeri.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3c591943eed225ad674b2f4e345e5e5a8fa9d59f940e7dda9f44e79b1f38071b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c591943eed225ad674b2f4e345e5e5a8fa9d59f940e7dda9f44e79b1f38071b.exe
Resource
win10v2004-20241007-en
General
-
Target
bfdc874676a343e1046bccec863adff14317901e69ae957bec49c1dc7591fd28
-
Size
274KB
-
MD5
9c5bdcc0249a6bd3ef24f40028ab43d9
-
SHA1
a0ffa57004e0b138d57d45beb31200e0d2e0dde3
-
SHA256
bfdc874676a343e1046bccec863adff14317901e69ae957bec49c1dc7591fd28
-
SHA512
9651bda9bf3700a17b16b6916212eb08ca5fcfc902d3077089832d50480224cf292c4ec1eb9418082b892199b9f3dda763c688be857aa6c9b34b7ea31a16b84c
-
SSDEEP
6144:diBSL6POlteJ2cLUK3PWAVs058P0dlFjYrrgjylJT:oBa76/UKL8spj2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3c591943eed225ad674b2f4e345e5e5a8fa9d59f940e7dda9f44e79b1f38071b
Files
-
bfdc874676a343e1046bccec863adff14317901e69ae957bec49c1dc7591fd28.zip
-
3c591943eed225ad674b2f4e345e5e5a8fa9d59f940e7dda9f44e79b1f38071b.exe windows:5 windows x86 arch:x86
06f1c3ab39e111f8058cb8b0bc4ba07c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FoldStringA
InterlockedDecrement
_hread
CancelWaitableTimer
WaitNamedPipeW
BuildCommDCBW
GetConsoleAliasExesLengthW
PeekConsoleInputA
CreateFileA
RegisterWaitForSingleObjectEx
LoadLibraryA
EnumResourceTypesA
TransmitCommChar
GetFirmwareEnvironmentVariableW
GetModuleFileNameW
BeginUpdateResourceA
LoadLibraryW
DeleteFileW
FillConsoleOutputCharacterA
GetProcAddress
GetUserDefaultLCID
GetConsoleAliasW
FindFirstChangeNotificationA
RemoveDirectoryA
GetCalendarInfoW
FindFirstFileExW
AreFileApisANSI
GetCurrentDirectoryW
GetConsoleAliasesLengthW
SetConsoleTitleW
GetBinaryTypeW
GlobalAlloc
FindNextFileA
OpenJobObjectA
HeapFree
_lclose
GetComputerNameW
TlsSetValue
SetCalendarInfoW
SetComputerNameA
FoldStringW
GetDiskFreeSpaceW
GetSystemDefaultLangID
SetThreadLocale
WriteConsoleW
RtlUnwind
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
IsProcessorFeaturePresent
GetLastError
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RaiseException
LCMapStringW
GetStringTypeW
SetStdHandle
FlushFileBuffers
HeapAlloc
HeapReAlloc
SetEndOfFile
GetProcessHeap
ReadFile
HeapSize
CreateFileW
gdi32
GetCharWidth32A
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 178KB - Virtual size: 32.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ