C:\xayacamitox-88\zexoma\seciruvixumug\zosogojulohon-18\sin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b8923ebdb0beb9d1bbd67d30a55cf13825ddf03a1cf1e35539bf232884754183.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b8923ebdb0beb9d1bbd67d30a55cf13825ddf03a1cf1e35539bf232884754183.exe
Resource
win10v2004-20241007-en
General
-
Target
b8923ebdb0beb9d1bbd67d30a55cf13825ddf03a1cf1e35539bf232884754183
-
Size
293KB
-
MD5
cff33b5466a9d3e6327fe3db8ea8fc63
-
SHA1
a2a1a51e28aaac18abf96dab12fbfe5685f5974a
-
SHA256
b8923ebdb0beb9d1bbd67d30a55cf13825ddf03a1cf1e35539bf232884754183
-
SHA512
3c329a4ef492469a6c3272e2a8a0e3cad12b813e2f2586938e6e676ef625dd66d844f80a5ab85ccbea1820b2076464372cf8fc9b5fef127eeae026aee69fd8e7
-
SSDEEP
6144:1tsELLrvfWTvGXYH+N6ceavLw6yD2+elLrrlCckNuzbgwuB:1tsEnr3WTuXYH3cea06y4J/l2Nunnm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8923ebdb0beb9d1bbd67d30a55cf13825ddf03a1cf1e35539bf232884754183
Files
-
b8923ebdb0beb9d1bbd67d30a55cf13825ddf03a1cf1e35539bf232884754183.exe windows:5 windows x86 arch:x86
fa2a2cc45b8202d88be58a4188cd7ca9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLocaleInfoA
SetComputerNameExA
ConvertThreadToFiber
ZombifyActCtx
GetEnvironmentStringsW
WaitForSingleObject
SetVolumeMountPointW
EnumCalendarInfoExW
GetConsoleAliasesA
TerminateThread
GetProcessHandleCount
GetVersionExW
GetConsoleAliasW
WriteConsoleInputW
WriteConsoleW
TerminateProcess
ReplaceFileW
FileTimeToSystemTime
GetConsoleAliasesW
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
ResetEvent
LocalAlloc
GetModuleHandleA
GetStringTypeW
GlobalAddAtomW
ResetWriteWatch
HeapReAlloc
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LoadLibraryA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
advapi32
AreAllAccessesGranted
Sections
.text Size: 225KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.buce Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ