Static task
static1
Behavioral task
behavioral1
Sample
c6df50da67318fb281c547ce18631b08532ad749bc4d26b824d047446372ee8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6df50da67318fb281c547ce18631b08532ad749bc4d26b824d047446372ee8a.exe
Resource
win10v2004-20220812-en
General
-
Target
c6df50da67318fb281c547ce18631b08532ad749bc4d26b824d047446372ee8a
-
Size
22KB
-
MD5
c09e61d6ca6e6fa6d9b71b373d35fe6a
-
SHA1
2c6dc6f237a3433d28cb4223ce8fa694d8d02e81
-
SHA256
c6df50da67318fb281c547ce18631b08532ad749bc4d26b824d047446372ee8a
-
SHA512
c0138a21d009dc33d32cfb12ddd4d2f0a833c5d494270c845fe0a862ef044331031778d73adb270e70c7e0f3e1f26019d59fe112cb03607b1cf97fbe73574c1a
-
SSDEEP
384:ecnE0N9TugdeVfaO+BWVHcufg/1uR07MGLfBGmFRRZYcfH6kLmG:ecnHN9T9eBgWVHcufs8+7zVGa1Y8vLmG
Malware Config
Signatures
Files
-
c6df50da67318fb281c547ce18631b08532ad749bc4d26b824d047446372ee8a.exe windows x86
f13fa1a1394daf4bb47d46dbdf83dce8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasEnumConnectionsA
kernel32
GetFileSize
GetLastError
GetModuleFileNameA
GetStartupInfoA
ExitProcess
GetCommandLineA
CloseHandle
SetEndOfFile
WriteFile
SetFilePointer
GetTempPathA
GetProcessHeap
WideCharToMultiByte
GetThreadLocale
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetLocalTime
GetWindowsDirectoryA
GetCurrentProcess
TerminateProcess
lstrlenA
LoadLibraryA
GetProcAddress
GetModuleHandleA
UnhandledExceptionFilter
CreateProcessA
GetSystemDefaultLCID
RtlUnwind
user32
CharNextA
advapi32
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
ole32
StringFromCLSID
CoCreateGuid
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ