Static task
static1
Behavioral task
behavioral1
Sample
01624e9c4892f4043f3c1a0b48bf6a02429c950b22172c0159771148f4417051.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01624e9c4892f4043f3c1a0b48bf6a02429c950b22172c0159771148f4417051.exe
Resource
win10v2004-20220901-en
General
-
Target
01624e9c4892f4043f3c1a0b48bf6a02429c950b22172c0159771148f4417051
-
Size
305KB
-
MD5
3a6d01bf9f787bdf576de87a5924a27f
-
SHA1
aeedfcb60193879c0cb6b86a3ff14998c1c5b9c2
-
SHA256
01624e9c4892f4043f3c1a0b48bf6a02429c950b22172c0159771148f4417051
-
SHA512
325617d2dd0d737a060023176bf57450b5f1d07943d872ebf0533a56e971b96ec066d26dcbd4ff6cc1b253e99e53350fa19ddcbef6fddcf9912f26bd3cbbc985
-
SSDEEP
6144:t7vr0uqTKx92WsmwMmnuUhDt+kcUWIZJK/8oep7s2Z4O3EP:JYuqTKx94rnuUhDbcUt5oe9yV
Malware Config
Signatures
Files
-
01624e9c4892f4043f3c1a0b48bf6a02429c950b22172c0159771148f4417051.exe windows x86
e9a770e5a0032a2385ff21675090f362
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
SetLastError
GetPrivateProfileStringW
lstrlenW
GetConsoleAliasW
ResumeThread
SetEvent
GetNumberFormatW
GetCurrentThreadId
GetModuleHandleA
EnterCriticalSection
TlsGetValue
EnumCalendarInfoW
FindAtomW
FindClose
HeapCreate
ReadFile
LocalFree
GetCurrentProcessId
CreateEventW
user32
GetClassInfoA
GetKeyState
IsWindow
GetClientRect
CallWindowProcW
GetMenuInfo
GetKeyboardType
GetCursorInfo
DispatchMessageA
DrawTextA
GetSysColor
DispatchMessageA
SetFocus
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ