E:\baofeng_guest\stormplayer9\Setup\BF_NewInstall\src\BF_InstallEngine\bin\Release\Uninst.pdb
Behavioral task
behavioral1
Sample
be6667194e1d66042e43ed2f297ee8c46172d802f693e021f3c7b3a62da18e83.exe
Resource
win7-20240903-en
General
-
Target
be6667194e1d66042e43ed2f297ee8c46172d802f693e021f3c7b3a62da18e83
-
Size
1.7MB
-
MD5
63321cff996c538481f0892446222ef8
-
SHA1
b57fded3fa4056544b62658d1f8b79dcc4ffbebb
-
SHA256
be6667194e1d66042e43ed2f297ee8c46172d802f693e021f3c7b3a62da18e83
-
SHA512
cffd7fc5018b75e36a03e4f5e23415c4f844ba72780b1343fa200a951175a59a54c2483a45958ae7eed084dfc34ebd23e1d57d69a7a7f1c8c445bd4b1eb299c1
-
SSDEEP
49152:lsskClXSMDbQmlu5z8RlA6yTizYG9Py+qcuQms33CHlXSMDbQmlu5z8R:lsskClXeIAxizYSy+qRlXe
Malware Config
Extracted
gozi
Signatures
-
Gozi family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be6667194e1d66042e43ed2f297ee8c46172d802f693e021f3c7b3a62da18e83
Files
-
be6667194e1d66042e43ed2f297ee8c46172d802f693e021f3c7b3a62da18e83.exe windows:5 windows x86 arch:x86
c44f70b260170e42a71e22016f06db3c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
LockResource
SizeofResource
FindResourceW
CloseHandle
CreateFileW
WriteFile
GetTempPathW
CreateProcessW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
HeapAlloc
IsProcessorFeaturePresent
GetProcAddress
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
Sleep
HeapSize
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
LoadLibraryW
HeapReAlloc
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetProcessHeap
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE