C:\podexiditupitu\sohugamenuy\pameyetexik.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a3a6b1fe65e060e747626a864412045881c08d8f0584749880cee83948c14736.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a3a6b1fe65e060e747626a864412045881c08d8f0584749880cee83948c14736.exe
Resource
win10v2004-20241007-en
General
-
Target
c11b0b648a57c050f5dc1ed7dcbaf386973dc47fbffb0308a579b6fe7e5387f5
-
Size
202KB
-
MD5
c71322e92c39613eb1ef2d3f32a1dbd8
-
SHA1
cfd9e8cde808fc7a2d6abbd1bd686355edefba27
-
SHA256
c11b0b648a57c050f5dc1ed7dcbaf386973dc47fbffb0308a579b6fe7e5387f5
-
SHA512
4bf1de63f8a5796b794f386f64df094b7288bb40c2575adbb01fd81ecfd0f3991cc809fde7cdd0111d16cfdbc4818388204d6cfbfbae93c99f6022aa905b9592
-
SSDEEP
6144:5CxM8YO8ARlqYaX4botQ5UhzHvMXR8RyDEU:ExM1gqYaX+/5USB8Ryx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a3a6b1fe65e060e747626a864412045881c08d8f0584749880cee83948c14736
Files
-
c11b0b648a57c050f5dc1ed7dcbaf386973dc47fbffb0308a579b6fe7e5387f5.zip
-
a3a6b1fe65e060e747626a864412045881c08d8f0584749880cee83948c14736.exe windows:5 windows x86 arch:x86
6d50de5d9e6eedfa2f6d928af4dafee7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDefaultLangID
SetProcessAffinityMask
GetStringTypeA
WriteConsoleOutputCharacterA
OpenJobObjectA
GetCommState
WaitNamedPipeA
CreateHardLinkA
GetModuleHandleW
GetTickCount
GetVolumePathNameW
GetPrivateProfileIntA
LoadLibraryW
CopyFileW
GetFileAttributesA
GetFileAttributesW
lstrlenW
LCMapStringA
GetConsoleAliasesW
GetProfileIntA
GetLastError
GetProcAddress
VirtualAlloc
SetComputerNameA
WriteConsoleA
LocalAlloc
SetProcessWorkingSetSize
GetModuleHandleA
CreateMutexA
FindNextFileW
GetFileAttributesExW
AddConsoleAliasA
SetFileAttributesW
LCMapStringW
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
WriteFile
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
WideCharToMultiByte
CreateFileA
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
GetStringTypeW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
SetEndOfFile
GetProcessHeap
ReadFile
RaiseException
GetConsoleOutputCP
WriteConsoleW
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ