Behavioral task
behavioral1
Sample
249009648a4e88d2cd0fb5e595c911e5dca3ec1d70252981554ab0331800cb92.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
249009648a4e88d2cd0fb5e595c911e5dca3ec1d70252981554ab0331800cb92.exe
Resource
win10v2004-20240508-en
General
-
Target
75efabc3056a03a80af5f744f2c7f616.bin
-
Size
416KB
-
MD5
e18a0255d46a15f070d946558d7a7e02
-
SHA1
6f3368e206f5f04378090173282e42a8c6f51781
-
SHA256
503f68ee6b9cb184e1dad186bb3f7e200a97b0ebd56de4a2bdd7e78d6c10e3aa
-
SHA512
93e0f7a4456220addd290c317a531267e4187664ade4308a88d79288d4d86c1775db83d06e15c08e3ba67604005659f94bb9272403090699e53ebe3921e90e45
-
SSDEEP
6144:qTglhfCZejLaR6ZzuO6+8yRaBnU1bcYK2Zrr2SyI4ODk/TuPALhbPMPFBE1FxQNT:7J6CLyC6+NKnkh2XwDwTuoLeiQ86jh
Malware Config
Signatures
-
Processes:
resource yara_rule static1/unpack001/249009648a4e88d2cd0fb5e595c911e5dca3ec1d70252981554ab0331800cb92.exe dcrat -
Dcrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/249009648a4e88d2cd0fb5e595c911e5dca3ec1d70252981554ab0331800cb92.exe
Files
-
75efabc3056a03a80af5f744f2c7f616.bin.zip
Password: infected
-
249009648a4e88d2cd0fb5e595c911e5dca3ec1d70252981554ab0331800cb92.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 814KB - Virtual size: 814KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ