C:\Users\New\Desktop\BitJoiner\payload\obj\Debug\payload.pdb
Behavioral task
behavioral1
Sample
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe
Resource
win10v2004-20250129-en
General
-
Target
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe
-
Size
2.7MB
-
MD5
a079d0ef7608f8fb08e6e67ebe720cdd
-
SHA1
612e4d36e0c92c850848ff92dc466fb2c956415b
-
SHA256
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274
-
SHA512
d2d4aa554c4bc1108dc73ee97dcb17fb66fdb862d64b10c08456fe62be5ff9d9e7b83a76956dbc2ffd855fb3a675d6939ee4416c4ebf2c55f060f7d0db93eb88
-
SSDEEP
49152:7bA3jfxSks5WqWk9IEJKb9aUgXXNOUnkonLxB5ctECb:7bwsgql9hJfUgX8+vc6i
Malware Config
Signatures
-
resource yara_rule sample dcrat -
Dcrat family
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule sample Nirsoft -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe
Files
-
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ