Static task
static1
General
-
Target
239fd930694473af362be2dc3f69356a93c407664fcf775e83e2a7f98eccc0ab
-
Size
199KB
-
MD5
dbb320cd3332f6da387c08cc81c6e0d0
-
SHA1
253d3870fc47543eba68c12d22203d772686de7f
-
SHA256
239fd930694473af362be2dc3f69356a93c407664fcf775e83e2a7f98eccc0ab
-
SHA512
64fb6410897616f1ba222ddc69c6a72ea815ce4f4833f536aafa6546f5c40f5ed1378a9a4c7ebbc02c581116e11ac959a7d72bf530e1d082547fbf1b63835c06
-
SSDEEP
3072:LIBiNUbumQqQ5WAB+XU/+kGjxza5+xzecmRZ9VgFiyFhz:ipQ5WwdGj1aMkcmRZ9uYyFh
Malware Config
Signatures
Files
-
239fd930694473af362be2dc3f69356a93c407664fcf775e83e2a7f98eccc0ab.exe windows x86
b8e78bd73afb771519a38767f795e9d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthA
OpenEventW
InterlockedExchange
GetLocaleInfoA
GetLongPathNameA
InterlockedDecrement
_lwrite
WriteConsoleInputA
GetSystemDirectoryW
MoveFileExA
CreateEventA
VerifyVersionInfoW
WaitNamedPipeA
ReadConsoleInputA
GlobalFree
GetCPInfoExW
BeginUpdateResourceW
EnumCalendarInfoExW
MoveFileW
ReadConsoleOutputCharacterA
GetConsoleAliasesLengthW
GlobalAlloc
GetModuleHandleW
EnumResourceNamesW
LocalAlloc
RemoveDirectoryA
GetCalendarInfoA
CommConfigDialogW
SetFileAttributesA
GetCommTimeouts
OpenJobObjectA
LCMapStringW
GetAtomNameA
GetFileAttributesW
SetConsoleTitleW
ReplaceFileA
CreateJobObjectW
GetProcessWorkingSetSize
GetBinaryTypeA
GetSystemDefaultLangID
GetUserDefaultLangID
GetConsoleAliasA
GetTickCount
GetCurrentProcess
SetLastError
GetPrivateProfileIntW
FreeLibrary
GetEnvironmentStringsW
GetFileTime
FindResourceExW
GetConsoleMode
GetDiskFreeSpaceA
GetConsoleAliasExesW
WaitForMultipleObjects
SetDefaultCommConfigA
LoadLibraryA
GetProcAddress
LoadLibraryW
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
GetLastError
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
IsProcessorFeaturePresent
HeapAlloc
HeapCreate
HeapFree
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
LeaveCriticalSection
EnterCriticalSection
Sleep
RtlUnwind
HeapSize
user32
ClientToScreen
gdi32
GetFontUnicodeRanges
ole32
CoRevokeMallocSpy
winhttp
WinHttpOpen
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.soc Size: 512B - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yoje Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ziceb Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.peloyow Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ