Static task
static1
Behavioral task
behavioral1
Sample
25d303c4a74835047eab1b1eda0517b18c1f5aea2ceade1a1f767c3f4c1d81df.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
25d303c4a74835047eab1b1eda0517b18c1f5aea2ceade1a1f767c3f4c1d81df.exe
Resource
win10v2004-20220812-en
General
-
Target
25d303c4a74835047eab1b1eda0517b18c1f5aea2ceade1a1f767c3f4c1d81df
-
Size
359KB
-
MD5
c8565c6bfa3eeb7447d2392c048bc679
-
SHA1
1459b339146f69fb572b9630d6e363dc1519887b
-
SHA256
25d303c4a74835047eab1b1eda0517b18c1f5aea2ceade1a1f767c3f4c1d81df
-
SHA512
bd5e63182773f099db53f1eca55388379b46c6c14aafb4805131171d2e6fbbf06e52c253792f9b6c8764bb22f956a5a71eb90e786fcdc16a007d0b29f3003b26
-
SSDEEP
6144:UynHxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzsVV2+:UkR9QI0Ay6fYvzEOe2KNSQ6l83zBzsu+
Malware Config
Signatures
Files
-
25d303c4a74835047eab1b1eda0517b18c1f5aea2ceade1a1f767c3f4c1d81df.exe windows x86
81393617db559fc736778864eebe34a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
HeapCreate
GetDriveTypeA
GetComputerNameW
ExitProcess
FindAtomW
LoadLibraryA
ReleaseMutex
lstrlenA
CreateFileA
LocalFree
GetDiskFreeSpaceW
GetTickCount
GetModuleHandleW
GetSystemTime
ResetEvent
ReleaseMutex
GetTickCount
CloseHandle
GetCommandLineW
user32
GetMenu
GetDlgItem
DispatchMessageA
GetClassInfoA
CloseWindow
GetComboBoxInfo
EndDialog
CallWindowProcA
DestroyCaret
GetCaretPos
DrawStateA
FillRect
CreateWindowExA
rasapi32
DwEnumEntryDetails
DwCloneEntry
RasDeleteEntryA
RasDialA
DwRasUninitialize
modemui
CountryRunOnce
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ