_gekkko@8
Static task
static1
Behavioral task
behavioral1
Sample
ae2b0e8314c477c7923cabf9e357c3d11b96c0871c6ae74a5e9cc75b0c9afd68.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ae2b0e8314c477c7923cabf9e357c3d11b96c0871c6ae74a5e9cc75b0c9afd68.exe
Resource
win10v2004-20220414-en
General
-
Target
ae2b0e8314c477c7923cabf9e357c3d11b96c0871c6ae74a5e9cc75b0c9afd68
-
Size
293KB
-
MD5
3558dd95b0781abdbf68553e9fade5d2
-
SHA1
841d66b95cb59561cdac3b24cd9bddd342b43a60
-
SHA256
ae2b0e8314c477c7923cabf9e357c3d11b96c0871c6ae74a5e9cc75b0c9afd68
-
SHA512
46a742670dab503e2ee2970d2c0aa004098ec523e22df44969c1aed3899f2c7509e4055d35d38ec3839247161dabfe98de04e97d21807257c8d3553d9bb3b00b
-
SSDEEP
6144:Ya8uNIrnX8YEOmSRjwVHPe8uEWOZR/RfdclI5o9plu+S:Ya8Tu08VH8EWW/ddcqyPlB
Malware Config
Signatures
Files
-
ae2b0e8314c477c7923cabf9e357c3d11b96c0871c6ae74a5e9cc75b0c9afd68.exe windows x86
8abaa600f884f8777c9710eff400b2f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenFile
SetFilePointer
TlsGetValue
GetNumberOfConsoleInputEvents
FindResourceExW
LoadResource
InterlockedIncrement
SetEnvironmentVariableW
GetProfileSectionA
CancelWaitableTimer
GetComputerNameW
ConnectNamedPipe
_lclose
GetModuleHandleW
CreateNamedPipeW
GetProcessHeap
GetSystemTimeAsFileTime
FindActCtxSectionStringA
SetProcessPriorityBoost
ActivateActCtx
GetPrivateProfileIntA
LoadLibraryW
GetPrivateProfileStructW
GetFileAttributesA
WritePrivateProfileStructW
IsDBCSLeadByte
lstrcatA
GetACP
ExitThread
lstrlenW
GetThreadContext
ReleaseActCtx
GetLastError
GetCurrentDirectoryW
GetProcAddress
IsValidCodePage
CopyFileA
GetLocalTime
LoadLibraryA
UnhandledExceptionFilter
LocalAlloc
BuildCommDCBAndTimeoutsW
GlobalMemoryStatusEx
VirtualLock
AddAtomA
GetTapeParameters
GetSystemInfo
SetConsoleCursorInfo
WaitCommEvent
ContinueDebugEvent
FreeEnvironmentStringsW
WriteProfileStringW
CompareStringA
OpenSemaphoreW
GetVersionExA
LocalFree
AreFileApisANSI
lstrcpyA
SetEnvironmentVariableA
CompareStringW
ExitProcess
RaiseException
GetCommandLineA
GetStartupInfoA
HeapAlloc
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
Sleep
HeapSize
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapDestroy
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetOEMCP
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
GetTimeZoneInformation
GetModuleHandleA
user32
GetCursorPos
advapi32
SetThreadToken
Exports
Exports
Sections
.text Size: 258KB - Virtual size: 257KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 733KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ