C:\solibov65\kanizu kin45\conunudeg-ker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a.exe
Resource
win7-20240903-en
General
-
Target
5c41a08eabd0556a0f493ef5b1554437a15880a8da4fa9290eca5b5f1e91a975.zip
-
Size
217KB
-
MD5
e9498c5a5bb6302dd8466bd6543292bf
-
SHA1
0d868e9641771866a225f7265477b74adddd7098
-
SHA256
5c41a08eabd0556a0f493ef5b1554437a15880a8da4fa9290eca5b5f1e91a975
-
SHA512
8a2b6d1c6add5a8f899aa1f7b53300e6df5048915fbab731c519f8f0ece15fcd32bfa3bdf735fa30a61a88655ceb54a956847b1620185e69b60dc38ea96e2875
-
SSDEEP
6144:zF4Vc2gHbX8+I5viMXxtG7YQu47+M2D8OKHeS:54VkHbM/i0uuULY1KHf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a.exe
Files
-
5c41a08eabd0556a0f493ef5b1554437a15880a8da4fa9290eca5b5f1e91a975.zip.zip
Password: infected
-
6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a.exe.exe windows:5 windows x86 arch:x86
0d61443d5aeb8f94dcb0465acbd1f25d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemWindowsDirectoryW
HeapFree
CreateDirectoryW
FlushViewOfFile
LocalFlags
GetPrivateProfileStringW
GetDriveTypeA
GlobalAlloc
LoadLibraryW
FreeConsole
GetSystemWow64DirectoryW
SetConsoleCursorPosition
GetModuleFileNameW
GetOverlappedResult
lstrlenW
GetStartupInfoA
GetStdHandle
OpenMutexW
InitializeSListHead
GetProcAddress
SetVolumeLabelW
AddAtomW
PostQueuedCompletionStatus
FindAtomA
SetEnvironmentVariableA
GetModuleFileNameA
CreateIoCompletionPort
FindFirstChangeNotificationA
HeapSetInformation
FreeEnvironmentStringsW
GetCurrentDirectoryA
OutputDebugStringA
GetCPInfoExA
SetProcessShutdownParameters
CloseHandle
CreateFileW
GetLastError
SearchPathW
SetStdHandle
RaiseException
GetCommandLineA
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
DecodePointer
GetModuleHandleW
ExitProcess
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapValidate
IsBadReadPtr
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
WriteConsoleW
OutputDebugStringW
IsProcessorFeaturePresent
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
GetTitleBarInfo
advapi32
AbortSystemShutdownW
msimg32
AlphaBlend
Sections
.text Size: 270KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 41.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ