b46aadcf7abc0c2f7e8758005ee45ec5

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2024-Jul-10 10:06:43
Detected languages English - United States
Debug artifacts C:\Users\Kfir\source\repos\hack-tools\x64\Release\hack-tools.pdb

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Contains references to security software:
  • rshell.exe
Contains domain names:
  • example.com
  • githubusercontent.com
  • https://example.com
  • https://raw.githubusercontent.com
  • https://raw.githubusercontent.com/juek187/nonodon/main/xcvbny
  • raw.githubusercontent.com
Info The PE contains common functions which appear in legitimate applications. Possibly launches other programs:
  • CreateProcessW
Has Internet access capabilities:
  • WinHttpSendRequest
  • WinHttpQueryDataAvailable
  • WinHttpOpenRequest
  • WinHttpReadData
  • WinHttpReceiveResponse
  • WinHttpConnect
  • WinHttpCrackUrl
  • WinHttpCloseHandle
  • WinHttpOpen
Malicious VirusTotal score: 5/74 (Scanned on 2024-07-10 12:33:46) APEX: Malicious
Bkav: W64.AIDetectMalware
CrowdStrike: win/malicious_confidence_60% (D)
MaxSecure: Trojan.Malware.300983.susgen
Microsoft: Trojan:Win32/Bearfoos.A!ml

Hashes

MD5 b46aadcf7abc0c2f7e8758005ee45ec5
SHA1 f326b3f7c8f44e7d6e5427ef03d9f5a9b55e43b6
SHA256 885312cbee9adaa02330db1792301c2f0a95b70f7b9fbc3b606386e7de878bcd
SHA3 8311063959196b5d17d744b226da6f9a032f24bc100c83e4bf060781788441da
SSDeep 768:gDHrfDDD9CbKDA13oDvDneRILrnO8NiCE+IVXEM3l7:gT9ANieQPO7
Imports Hash 30d4a65e42a9e11ce6d7c30d330c4853

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf8

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2024-Jul-10 10:06:43
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x5a00
SizeOfInitializedData 0x5600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000000057E0 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xf000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 7efe05d56b7d94594c09396f1dcd6e57
SHA1 5cf61bc9e314af04661ca5a3c04fa788b7377300
SHA256 b559ccb2123ce0937bb2007aeb459024282490d412fcd7c377d24ab5545207ea
SHA3 4e9015a5a87f4044eef09eb4aef94c80545b364b7d6d69ecbda9f931cd817c22
VirtualSize 0x58bb
VirtualAddress 0x1000
SizeOfRawData 0x5a00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.07794

.rdata

MD5 cccb7f4df9ebe9bfa12824c998f00690
SHA1 864b3fdad9ddcaed322aaae8d96d52b3fc66a278
SHA256 ab72358c58ff9008d0fe59c90dc8a4ba7255012ccfae3ce6f0f668c0e5c1c6b5
SHA3 de10b16d28a5c893a79fe5a4285cdab52ef1e5c1fdc936e8e52a374f7d546f59
VirtualSize 0x3f2e
VirtualAddress 0x7000
SizeOfRawData 0x4000
PointerToRawData 0x5e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.90952

.data

MD5 ef84e6309c3172dbb983b50713387b8b
SHA1 e70ab948c082b3e7cc69e181f0135127d1e22ad4
SHA256 0f795664c3d9f051748ba4ae2198d93fc3baa2dd41b1af3735033ba91bd8d3ee
SHA3 1babc2b19fb1d9aae27169dee371e9b6cfecf68026ca10b4e8652a8059202243
VirtualSize 0x9a8
VirtualAddress 0xb000
SizeOfRawData 0x400
PointerToRawData 0x9e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.23642

.pdata

MD5 ed47078f49a0b764db49e1274ac1d7db
SHA1 1be299838a9c76d9f15d4a8152993156300209d4
SHA256 6d2b0c2decbaff2dd807670f90042b0a5f5529adf9823198f67176b150af396f
SHA3 b932666322e4a7e4700a477e63245f1adc5d91f39145a416c615a682ff31aaa5
VirtualSize 0x678
VirtualAddress 0xc000
SizeOfRawData 0x800
PointerToRawData 0xa200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.6328

.rsrc

MD5 44e3d39532c9319314b3e7669556d25a
SHA1 62781e8e72142285145da0e0b84c51e38b6e4cb0
SHA256 82734dc2b49e549f19311dc082c046cb8f3d019d2dab2b1b25fac08f4cc1a306
SHA3 c34360de44e134e645cca7885573b5550929b45e961557e2956406e27fcd167a
VirtualSize 0x1e0
VirtualAddress 0xd000
SizeOfRawData 0x200
PointerToRawData 0xaa00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.7015

.reloc

MD5 a9e3e5c376cc831bf6833748a5e6867e
SHA1 cbf7915a5639aa8edaefa201fb7816fbfb34f1e8
SHA256 4f7bedc8d7a65a3a2f5d8e5a75f6ef44084f109231aa1863be904472966b953c
SHA3 c8a80d5019b5478f3022e7b8a17f09a0368a2da61de097f3410e3367c469f1e7
VirtualSize 0xa4
VirtualAddress 0xe000
SizeOfRawData 0x200
PointerToRawData 0xac00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 2.16129

Imports

KERNEL32.dll Sleep
MultiByteToWideChar
CreateProcessW
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
RtlCaptureContext
MSVCP140.dll ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@J@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAJ@Z
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
?good@ios_base@std@@QEBA_NXZ
??7ios_base@std@@QEBA_NXZ
??Bios_base@std@@QEBA_NXZ
?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?always_noconv@codecvt_base@std@@QEBA_NXZ
??Bid@locale@std@@QEAA_KXZ
?_Throw_Cpp_error@std@@YAXH@Z
_Cnd_do_broadcast_at_thread_exit
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
??1_Lockit@std@@QEAA@XZ
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?_Xlength_error@std@@YAXPEBD@Z
?id@?$ctype@D@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
??0_Lockit@std@@QEAA@H@Z
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?uncaught_exception@std@@YA_NXZ
WINHTTP.dll WinHttpSendRequest
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpReadData
WinHttpReceiveResponse
WinHttpConnect
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpOpen
VCRUNTIME140_1.dll __CxxFrameHandler4
VCRUNTIME140.dll __current_exception
__current_exception_context
memset
_CxxThrowException
__std_exception_copy
__std_exception_destroy
memmove
memcpy
__std_terminate
__C_specific_handler
api-ms-win-crt-stdio-l1-1-0.dll fputc
fgetc
fflush
fclose
fwrite
_get_stream_buffer_pointers
_set_fmode
_fseeki64
fread
fsetpos
ungetc
setvbuf
fgetpos
__p__commode
api-ms-win-crt-filesystem-l1-1-0.dll _unlock_file
_lock_file
api-ms-win-crt-runtime-l1-1-0.dll __p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_exit
_initialize_narrow_environment
_seh_filter_exe
exit
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_set_app_type
_beginthreadex
_configure_narrow_argv
terminate
_initterm_e
_invalid_parameter_noinfo_noreturn
_initterm
_get_initial_narrow_environment
api-ms-win-crt-heap-l1-1-0.dll malloc
free
_set_new_mode
_callnewh
api-ms-win-crt-math-l1-1-0.dll __setusermatherr
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale

Delayed Imports

1

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x17d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.91161
MD5 1e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA1 4260284ce14278c397aaf6f389c1609b0ab0ce51
SHA256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA3 4bb9e8b5a714cae82782f3831cc2d45f4bf4a50a755fe584d2d1893129d68353

Version Info

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2024-Jul-10 10:06:43
Version 0.0
SizeofData 89
AddressOfRawData 0x8860
PointerToRawData 0x7660
Referenced File C:\Users\Kfir\source\repos\hack-tools\x64\Release\hack-tools.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2024-Jul-10 10:06:43
Version 0.0
SizeofData 20
AddressOfRawData 0x88bc
PointerToRawData 0x76bc

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2024-Jul-10 10:06:43
Version 0.0
SizeofData 780
AddressOfRawData 0x88d0
PointerToRawData 0x76d0

IMAGE_DEBUG_TYPE_ILTCG

Characteristics 0
TimeDateStamp 2024-Jul-10 10:06:43
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x14000b040

RICH Header

XOR Key 0x4eb93f0d
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 12
ASM objects (33731) 3
C objects (33731) 10
C++ objects (33731) 26
Imports (33731) 6
Imports (30795) 5
Total imports 157
C++ objects (LTCG) (33811) 2
Resource objects (33811) 1
Linker (33811) 1

Errors

<-- -->