Behavioral task
behavioral1
Sample
1300-57-0x0000000000400000-0x000000000059F000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1300-57-0x0000000000400000-0x000000000059F000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1300-57-0x0000000000400000-0x000000000059F000-memory.dmp
-
Size
1.6MB
-
MD5
9388349d4b64a6091fc43ffc04e7a786
-
SHA1
9be907c34dfcc73b5b0753ff57d76bfea6a718ea
-
SHA256
8f7bb030f02d3780cce23def0064226a205e2c2820a2f541371e1a1a01ab4364
-
SHA512
690c0daf015e89f60d3295280170e5526f44e861a384d37353c1d583e6aaae09265d33eb48c786cb0b3de19c27da6f240c6c8e6abc4be24a55522981a598940d
-
SSDEEP
12288:Udt56ehi/H9SDomjDBvMYojCmDu76Kg6:ciXLDf6
Malware Config
Extracted
nymaim
208.67.104.97
85.31.46.167
Signatures
-
Nymaim family
Files
-
1300-57-0x0000000000400000-0x000000000059F000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ