Static task
static1
Behavioral task
behavioral1
Sample
eae7b1282f767f0fbe854a6436a1b56091405cebe1154d69aa33c3d275387b6f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eae7b1282f767f0fbe854a6436a1b56091405cebe1154d69aa33c3d275387b6f.exe
Resource
win10v2004-20220901-en
General
-
Target
eae7b1282f767f0fbe854a6436a1b56091405cebe1154d69aa33c3d275387b6f
-
Size
35KB
-
MD5
2c062718c605ccde9895dc79333d68e7
-
SHA1
0b11d28fb56b27ced0af222990c1adcbae8d60e0
-
SHA256
eae7b1282f767f0fbe854a6436a1b56091405cebe1154d69aa33c3d275387b6f
-
SHA512
11aa2f7e31ab4b9f80c1ef5a5b85d97526c1d86bf8cad118058ea78a40c1f90bccb1d8af8aed0831798fe537dbf79d345563aa1486ca125bc14ded2bcff07e73
-
SSDEEP
768:VfgffwhokkJK8mOTniMkCSx/hz22DyV9T7A08SV:VfgghTUlTniMoxE19TE0h
Malware Config
Signatures
Files
-
eae7b1282f767f0fbe854a6436a1b56091405cebe1154d69aa33c3d275387b6f.exe windows x86
7cbaf474b5d8b8522f962c45ca08a036
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAStartup
connect
gethostbyaddr
gethostbyname
htons
inet_addr
recv
send
socket
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
shell32
ShellExecuteA
kernel32
GetCommandLineA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetSystemDirectoryA
CloseHandle
GetTickCount
HeapAlloc
HeapFree
CopyFileA
OpenMutexA
CreateDirectoryA
ReadFile
RtlUnwind
RtlZeroMemory
CreateFileA
SetFilePointer
Sleep
WriteFile
CreateMutexA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
user32
wsprintfA
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
exit
memset
raise
rand
signal
srand
strchr
strstr
strtok
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE