C:\lofuxiciboga82 bebakopimuvik23_gefuledetajef\bu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
71dcb20f11e4c812a9e570965a7543d2bab944b23f56242d35025151a71d7702.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
71dcb20f11e4c812a9e570965a7543d2bab944b23f56242d35025151a71d7702.exe
Resource
win10v2004-20241007-en
General
-
Target
71dcb20f11e4c812a9e570965a7543d2bab944b23f56242d35025151a71d7702
-
Size
200KB
-
MD5
ba272034be5b49d44f1094d5bfa58357
-
SHA1
b4d0d229548a2537775d9f210afb079e361d2c25
-
SHA256
71dcb20f11e4c812a9e570965a7543d2bab944b23f56242d35025151a71d7702
-
SHA512
d038adea4a3d00f0cf3503a3b0b34bd5878932b7c32974a9bcf4089889cc13ddecbc4bd86a8971cd7e005d8aa6c3d6df2b39ca2b57e1105e7f2b0cb9787d6879
-
SSDEEP
3072:nBN2ZG53LTE+EOMcz5GZtzNGVxQ+tICqHbNt08wwayhR:B1Lg/OMcYZ8tICuX0Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71dcb20f11e4c812a9e570965a7543d2bab944b23f56242d35025151a71d7702
Files
-
71dcb20f11e4c812a9e570965a7543d2bab944b23f56242d35025151a71d7702.exe windows:5 windows x86 arch:x86
2fb86d3afd3014d2e2e15a2dd2f620c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FileTimeToLocalFileTime
FindActCtxSectionStringW
GetCommModemStatus
GetSystemWindowsDirectoryA
GlobalHandle
FindFirstVolumeMountPointW
CreateDirectoryExW
GlobalSize
GetLogicalDriveStringsW
ReadConsoleInputA
GetComputerNameExA
GetTempPathW
GetCurrentDirectoryA
WaitForDebugEvent
LCMapStringW
GetProcAddress
GlobalAlloc
GetCommandLineA
GetBinaryTypeA
InterlockedExchange
ReadConsoleOutputCharacterA
CreateMutexA
GetConsoleTitleW
SearchPathW
ExpandEnvironmentStringsW
FindResourceA
GetLastError
LoadLibraryW
GetCommMask
LocalReAlloc
CreateFileA
TerminateThread
GlobalFlags
GetConsoleAliasesLengthW
DeleteVolumeMountPointA
GetVolumePathNameW
SetVolumeMountPointA
lstrcmpA
DeleteTimerQueueTimer
GetLocaleInfoW
GetComputerNameA
lstrcpynW
SetConsoleTextAttribute
CopyFileW
FileTimeToDosDateTime
QueryDosDeviceA
CreateActCtxW
DeleteVolumeMountPointW
MoveFileWithProgressW
SetConsoleDisplayMode
WaitForMultipleObjectsEx
WritePrivateProfileStructA
InterlockedExchangeAdd
EnumTimeFormatsA
VerifyVersionInfoA
FindNextFileA
GetTickCount
GetConsoleAliasA
FreeLibraryAndExitThread
GetComputerNameExW
LoadLibraryA
CloseHandle
HeapSize
ReadFile
HeapFree
MoveFileA
DeleteFileA
GetStartupInfoW
GetModuleHandleA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
VirtualAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RaiseException
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
GetMessageExtraInfo
gdi32
GetCharWidthA
winhttp
WinHttpReadData
msimg32
TransparentBlt
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 39.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ