Behavioral task
behavioral1
Sample
736-57-0x0000000000400000-0x0000000000465000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
736-57-0x0000000000400000-0x0000000000465000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
736-57-0x0000000000400000-0x0000000000465000-memory.dmp
-
Size
404KB
-
MD5
82dc5154ffa6c41149d7943e79b95f65
-
SHA1
aee070f18fc24ed9f8f252044c68462990448fbf
-
SHA256
caf823a34c16375675b7be8099b7d1c8878ede3f92f97c78a6e53b62d5fd2fb7
-
SHA512
96d4a49fc1f6bac026c1ea1f0ccd8970d3b105e48eafb943900cff14934e3b1f7f5761d56f1c1c90051978e95af183a9997452a251b4fba0124d0b1c2a98ff54
-
SSDEEP
6144:meR/2GERZcRKuZ/i+EsjADIjCloAWK0sMHGU8PAOaGCf0G2DnigabwVfb:meR/2GuZccuZ/LE2ADIjudXxCcpDi
Malware Config
Extracted
nymaim
208.67.104.97
85.31.46.167
Signatures
-
Nymaim family
Files
-
736-57-0x0000000000400000-0x0000000000465000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ