C:\laro tehe_diquonos kaci leberef\gobejapo\yasi\xetenowe\kev xinafek hahohaq.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe
Resource
win7-20240903-en
General
-
Target
0ef38dbc5d7d1d22974c3d4d3a201467.bin
-
Size
511KB
-
MD5
fed63458f08eb344fa263d94ae64fa51
-
SHA1
b1d0df7197927073dd509e0160340dd80021bf36
-
SHA256
d03dcb257a00b6b6105eb2ecf96a594eb68a846d9a55d9f27714b9cb5dc623be
-
SHA512
5192999ec679b6a07321cfb9c7ca23b98545ed7193c4af67a564055f08159f2a90255a62415c76b19b50c29244720c33a3016e7541b88f6356b3961b9e2073fb
-
SSDEEP
12288:Mz9vIJCqhpMwvfp+lBJ9716X4tMGxLSF6z+qPZXkX2PIV3k:Mz9lqcLlSmzsI+qlZPi0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe
Files
-
0ef38dbc5d7d1d22974c3d4d3a201467.bin.zip
Password: infected
-
c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe.exe windows:6 windows x86 arch:x86
Password: infected
3fcb94bc49395a72218aa5d5f59485d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
CreateFileW
DecodePointer
DeleteCriticalSection
EncodePointer
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileType
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapQueryInformation
HeapReAlloc
HeapSize
HeapValidate
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
MultiByteToWideChar
OutputDebugStringW
QueryPerformanceCounter
RaiseException
RtlUnwind
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WideCharToMultiByte
WriteConsoleW
WriteFile
Sections
.text Size: 480KB - Virtual size: 479KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.voltbl Size: 512B - Virtual size: 242B
ji Size: 465KB - Virtual size: 465KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ