Static task
static1
Behavioral task
behavioral1
Sample
DNF偷渡.exe
Resource
win7-20220812-en
General
-
Target
50e20d1ed111be533add00ae219ec3cf8c41930c24c3e6a141384479ef4772d6
-
Size
70KB
-
MD5
8db1dbba1eb8a8d519a7d387d5b523f4
-
SHA1
7e425d8a4ad07500123ab043d8a2f733c6a1b4d4
-
SHA256
50e20d1ed111be533add00ae219ec3cf8c41930c24c3e6a141384479ef4772d6
-
SHA512
44305a178a2b518c5cd1c6da2f7ab9a883c2dc705fb073307f0011eb22cbcc4e05d42161c1d19585dfe7788adb607830e7dcc0fa7f3fb16a59214e45430d09c3
-
SSDEEP
1536:xegq4LpYfEygudqfGLBUc9PIiuE2uPr6XaJYS9o:EgjlZO4m+c9PIiP27Go
Malware Config
Signatures
Files
-
50e20d1ed111be533add00ae219ec3cf8c41930c24c3e6a141384479ef4772d6.rar
-
DNF偷渡.exe.exe windows x86
bd51a645a9c68bd03b2e51586e5cbdcb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
Sections
coban2k! Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE