C:\Users\ivank\source\repos\skeet\Release\skeet.pdb
Behavioral task
behavioral1
Sample
FataliyCrack/FatalityLoader.exe
Resource
win10v2004-20241007-en
General
-
Target
FataliyCrack (Crack).rar
-
Size
2.7MB
-
MD5
aaca7720f9b71f038a365c927b6e3da6
-
SHA1
e67b449a9bab51a2c407ebeff48651e329da1298
-
SHA256
722416d5d03bb6f124099c32f51332b07e02ed9da1f38b55259ffcbbaf06b247
-
SHA512
b36d02132768662974d94fe31744e03dda88fed380048ebeefe73e788b5a77e97fd4edbcf9b04ab97d2aa431433f7320277d14d5deddf4135378b4924e32fc77
-
SSDEEP
49152:hdEHpLZRMMdAZqjOLSliYATU0OwfWBRE/7Me+LOQyI1cyDG8mw9Ta4O:hWJNWMHOLSliYA4Ci2+Vy3yK8hW4O
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
FatalityLoader.exe
-
pastebin_url
https://pastebin.com/raw/mercTNMT
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/FataliyCrack/FatalityLoader.exe family_xworm -
Xworm family
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/FataliyCrack/Fatality.dll unpack001/FataliyCrack/FatalityLoader.exe
Files
-
FataliyCrack (Crack).rar.rar
Password: Crack
-
FataliyCrack/Fatality.dll.dll windows:6 windows x86 arch:x86
Password: Crack
eaf67aba045dcfff7b1d28ae8bfc8b09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetModuleHandleA
AllocConsole
SetConsoleTitleA
CreateThread
GetProcAddress
FindResourceW
LoadResource
LockResource
SizeofResource
VirtualAlloc
LoadLibraryA
AddVectoredExceptionHandler
SetThreadContext
ResumeThread
CloseHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
SetEnvironmentVariableW
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
ReleaseSRWLockExclusive
user32
MessageBoxA
FindWindowA
MessageBoxW
msvcp140
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDXZ
?_Xlength_error@std@@YAXPBD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Throw_Cpp_error@std@@YAXH@Z
_Thrd_detach
?setf@ios_base@std@@QAEHHH@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Xinvalid_argument@std@@YAXPBD@Z
?_Xbad_function_call@std@@YAXXZ
_Cnd_do_broadcast_at_thread_exit
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@I@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@_K@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?width@ios_base@std@@QBE_JXZ
?flags@ios_base@std@@QBEHXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
?width@ios_base@std@@QAE_J_J@Z
?uncaught_exceptions@std@@YAHXZ
?good@ios_base@std@@QBE_NXZ
?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
vcruntime140
__current_exception_context
memset
__std_exception_copy
__std_exception_destroy
__CxxFrameHandler3
_CxxThrowException
_except_handler4_common
__std_type_info_destroy_list
memcpy
__current_exception
memmove
api-ms-win-crt-runtime-l1-1-0
_execute_onexit_table
_configure_narrow_argv
_initterm_e
_beginthreadex
_initterm
_cexit
_initialize_narrow_environment
_errno
_crt_atexit
_seh_filter_dll
terminate
_invalid_parameter_noinfo_noreturn
_register_onexit_function
_initialize_onexit_table
system
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
__acrt_iob_func
freopen
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
api-ms-win-crt-convert-l1-1-0
strtoul
strtod
strtoull
strtoll
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-math-l1-1-0
_dclass
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 537KB - Virtual size: 537KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10.9MB - Virtual size: 10.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
FataliyCrack/FatalityLoader.exe.exe windows:4 windows x86 arch:x86
Password: Crack
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
FataliyCrack/инструкция.txt