ZharkBOT.pdb
Static task
static1
Behavioral task
behavioral1
Sample
RedSystem.exe
Resource
win7-20241023-en
General
-
Target
RedSystem.exe
-
Size
607KB
-
MD5
933f2db7b8ded6946f35720a366e7b14
-
SHA1
5411148b9de498d98e2ee67c8685717d8b44f4cd
-
SHA256
ba8d4df86924743be143d569ac06b8a1b1d7e2c554720e7f31126a0db04c3daa
-
SHA512
45a4b2474b63bfca9551dc21116fc33797fb62d9f57a439693152df0114a07530afc7de95dba417d9750d108bcc406388cb9d37bfe5e147b221c7accd33e07b6
-
SSDEEP
12288:2LiIDxg9D7D8zxHk4la1v2mCVsNgSB+EKn6fGPR4Q5xx:2LiIlg9D7Doxk4ECaN3QEKbPR4Q5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RedSystem.exe
Files
-
RedSystem.exe.exe windows:6 windows x86 arch:x86
1b27045adbbf28f4d991e6f3c9541cfa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
bcryptprimitives
ProcessPrng
api-ms-win-core-synch-l1-2-0
WakeByAddressAll
WaitOnAddress
WakeByAddressSingle
ntdll
RtlNtStatusToDosError
RtlUnwind
RtlGetVersion
RtlCaptureContext
NtQueryInformationProcess
NtQuerySystemInformation
NtWriteFile
kernel32
GetComputerNameExW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
K32GetPerformanceInfo
DeleteCriticalSection
GlobalMemoryStatusEx
RaiseException
InitializeCriticalSectionAndSpinCount
ReadProcessMemory
HeapAlloc
GetProcessIoCounters
GetSystemTimes
LocalFree
LoadLibraryExA
FreeLibrary
GetLastError
EncodePointer
WaitForSingleObject
IsProcessorFeaturePresent
FormatMessageW
OpenProcess
SetUnhandledExceptionFilter
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetCurrentThread
SwitchToThread
CreateWaitableTimerExW
SetWaitableTimer
Sleep
QueryPerformanceCounter
ReleaseMutex
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
UnhandledExceptionFilter
SetFileInformationByHandle
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
LoadLibraryA
GetProcAddress
GetCurrentProcess
VirtualProtectEx
HeapFree
WriteProcessMemory
VirtualProtect
VirtualAlloc
GetProcessTimes
GetStdHandle
CreateFileW
CloseHandle
TerminateProcess
GetSystemTimePreciseAsFileTime
HeapReAlloc
WaitForSingleObjectEx
lstrlenW
CreateMutexA
FindClose
GetFileInformationByHandle
GetFileInformationByHandleEx
FindFirstFileW
GetConsoleMode
GetCurrentProcessId
GetModuleHandleW
ExitProcess
MultiByteToWideChar
WriteConsoleW
CreateThread
GetFullPathNameW
GetModuleHandleA
GetSystemInfo
VirtualQueryEx
GetProcessHeap
advapi32
IsValidSid
RegOpenKeyExW
RegQueryValueExW
GetLengthSid
GetTokenInformation
OpenProcessToken
CopySid
RegCloseKey
pdh
PdhGetFormattedCounterValue
PdhOpenQueryA
PdhRemoveCounter
PdhAddEnglishCounterW
PdhCloseQuery
PdhCollectQueryData
powrprof
CallNtPowerInformation
psapi
GetProcessMemoryInfo
GetModuleFileNameExW
shell32
CommandLineToArgvW
oleaut32
GetErrorInfo
SysFreeString
SysStringLen
api-ms-win-crt-heap-l1-1-0
calloc
malloc
free
_set_new_mode
api-ms-win-crt-string-l1-1-0
wcslen
wcsncmp
strcpy_s
api-ms-win-crt-runtime-l1-1-0
terminate
_initialize_onexit_table
_register_onexit_function
_controlfp_s
_register_thread_local_exe_atexit_callback
_cexit
__p___argv
__p___argc
abort
_exit
exit
_initterm_e
_c_exit
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_crt_atexit
_set_app_type
_seh_filter_exe
_initterm
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 404KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ