Static task
static1
Behavioral task
behavioral1
Sample
e1b02016b2cc99dd8de1f8bf93ec7ed7f8630b77d483888be2bf28df9027967d.exe
Resource
win7-20220414-en
General
-
Target
e1b02016b2cc99dd8de1f8bf93ec7ed7f8630b77d483888be2bf28df9027967d
-
Size
1.9MB
-
MD5
bc89ccd9f7b8c62579d6f66b8d19e0a6
-
SHA1
fb96cf32c3707f7b01816f2f646a90749f976496
-
SHA256
e1b02016b2cc99dd8de1f8bf93ec7ed7f8630b77d483888be2bf28df9027967d
-
SHA512
4a84f32430fc3779a2c5e03982087a7da386a4021212816a85dd261e42796152441323074a3153b20b8fc4a98a8c6788c45d47cd43156fe1f970ad18fc8921f6
-
SSDEEP
24576:gxOgTuPh+Lnz8RegAL/lnYWQ3Yz2MdQ6VMwcL0k5Y9TIoc1Z9DEfncTL:gVtz8lAL/eWQIFdQ4MwcAk+8h1ZtEP
Malware Config
Signatures
Files
-
e1b02016b2cc99dd8de1f8bf93ec7ed7f8630b77d483888be2bf28df9027967d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 621KB - Virtual size: 620KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jwx0 Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 629KB - Virtual size: 629KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jwx1 Size: 506KB - Virtual size: 505KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE