Signatures
Queries computer hostname
Queries the computer locale (possible geofencing)
SetUnhandledExceptionFilter detected (possible anti-debug)
Uses Windows APIs to generate a cryptographic key
Checks system language via registry key (possible geofencing)
Attempts to connect to a dead IP:Port (8 unique times)
Performs HTTP requests potentially not found in PCAP.
Enumerates running processes
Expresses interest in specific running processes
Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
The binary likely contains encrypted or compressed data
Creates RWX memory
Mimics the system's user agent string for its own requests
Yara detections observed in process dumps, payloads or dropped files
Anomalous binary characteristics