C:\Users\Administrator\Documents\CalculadoraWPF-main\CalculadoraWPF\obj\x64\Release\netcoreapp3.1\win-x64\Installation_x64.pdb
Behavioral task
behavioral1
Sample
2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8.exe
Resource
win7-20241010-en
General
-
Target
2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8
-
Size
339KB
-
MD5
3a3d645ae76afd98ed7ee668467d6ed3
-
SHA1
d23a0b2f035f9b84a62b310922ba6fdaf919ce70
-
SHA256
2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8
-
SHA512
cb5b515495f1179e69f17816b23450d338d64d9bafb030512d4d0282547fcaf2383ce37926c13283887d19d2f9dfa63e8c61b27867c3534b5d37fe751de5d46e
-
SSDEEP
6144:nMMt+bZf0d6McOvwv6zGhtrys2NOr8Yyn5TNOr8Yyn5ODi:nMMt0ZPMIlhtr8NO4jnhNO4jnMDi
Malware Config
Extracted
jwtloader
https://cdn-gravitiumgame.xyz/wpfg
http://xilloolli.com/api-debug.php
https://shacolasemporiumpark.com
http://mysticsmirage.com/api.php
Signatures
-
Detects JWTloader aka JohnWalkerTexasLoader payload 1 IoCs
JWTloader or JohnWalkerTexasLoader is a loader/downloader written in C#.
Processes:
resource yara_rule sample family_jwtloader -
Jwtloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8
Files
-
2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 320KB - Virtual size: 319KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ