Static task
static1
General
-
Target
minitestrat_x64.exe
-
Size
10KB
-
MD5
704223d1525681e9b1dcd8ab493305ee
-
SHA1
83fac8ca21dacb18efb8a19cd8a5dfbeec70d164
-
SHA256
c392d6e701456fbd50b8677379cd45c492875ad7b27e2a3174123c7239218684
-
SHA512
c2074ee480ded97bafe0f202801e8304d62917dc6a189f310a8904e5ea3b7eebef3a46fad96c6f5b4610bf1c89de13196e8cb0a531bc8f39cc9b7367fea297eb
-
SSDEEP
192:SnfqPctHWkPcPrDAwnoVS7VuMx/la3AbNZr0nbaq6bDMuVZc4kyf:SnfqPchpPmRoVS7IE/lqiZr0np6Mu7cq
Malware Config
Signatures
Files
-
minitestrat_x64.exe.exe windows x64
144e52d8ceda34529f9690dae4aff702
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WriteProcessMemory
Sleep
WriteFile
CloseHandle
lstrcpyA
lstrlenA
GetModuleHandleA
GetLastError
GetTempPathA
GetTempFileNameA
CreateFileA
GetComputerNameExA
GetVersionExA
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateRemoteThread
CreateThread
ExitProcess
GetCurrentProcessId
OpenProcess
VirtualAllocEx
VirtualAlloc
LocalFree
LocalSize
LocalAlloc
CreateProcessA
GetProcAddress
user32
wsprintfA
advapi32
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
GetUserNameA
SystemFunction036
ws2_32
closesocket
connect
htons
inet_addr
inet_ntoa
recv
select
send
socket
gethostbyname
WSAStartup
WSACleanup
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ