Static task
static1
Behavioral task
behavioral1
Sample
ppdjdafasqfz_gr/??????.url
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ppdjdafasqfz_gr/??????.url
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
ppdjdafasqfz_gr/???????????6.06.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
ppdjdafasqfz_gr/???????????6.06.exe
Resource
win10v2004-20220414-en
General
-
Target
0aeb86699aaeabff70d60aaad71285d9a942d8e9f0f230df858ed9789ab4a25a
-
Size
1.9MB
-
MD5
c4ea4d1b3cb6ea95452258464d7c5c63
-
SHA1
e561e89f837cd99c9d21e7c99ee9b86d12776489
-
SHA256
0aeb86699aaeabff70d60aaad71285d9a942d8e9f0f230df858ed9789ab4a25a
-
SHA512
bb92a99bc4ece69b768eae9d96376c5b2b6f4f5670fa2f0a37a87b7fb8d1497aec8ec57846d3f30e898b5aa21f87f5c61d31fb6d3c4f18ed9494c41e82f385a5
-
SSDEEP
49152:MA+Q5ivy6ILflJQzdj2nB0S/PF90y4sZrc8wTg9wF9:MLGUIL+djMBPZ4sZrc8wTga/
Malware Config
Signatures
Files
-
0aeb86699aaeabff70d60aaad71285d9a942d8e9f0f230df858ed9789ab4a25a.zip
-
ppdjdafasqfz_gr/??????.txt
-
ppdjdafasqfz_gr/??????.url.url
-
ppdjdafasqfz_gr/???????????6.06.exe.exe windows x86
baa93d47220682c04d92f7797d9224ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Sections
Size: 660KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
aflwvunm Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gefndjaj Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE