Static task
static1
Behavioral task
behavioral1
Sample
REF.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
REF.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
gaffes/actualistsMollusk.js
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
gaffes/actualistsMollusk.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
gaffes/inhibitedScribbly.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
gaffes/inhibitedScribbly.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
gaffes/twinkle.dll
Resource
win7-20220812-en
General
-
Target
REF#3908.iso
-
Size
1016KB
-
MD5
c54aa854dd769bdb588ddd9ecdcd907d
-
SHA1
a30593dda09e529ddfc223cd4c2b5230c2e334eb
-
SHA256
b82edd7205a215c5cce4ee969d9ca9b542771bf7e8764ce5b04f992dcfba9a0b
-
SHA512
5d03e5a7f2e084848029b620507481744c35e09992e96cbc403e9f75c18891cea3590261e55c44672ff7c8a3d8cb3bee746115177bdecb5094e88e7702090aaa
-
SSDEEP
12288:MBLg7I87oCieL1vc1PdFjpmw5qS6xnGWmE/N285UT+QD1lNMA:MBLg7I87o581IFnqnmEl5w9M
Malware Config
Signatures
Files
-
REF#3908.iso.iso .js
-
REF.lnk.lnk
-
gaffes/actualistsMollusk.js.js
-
gaffes/agreeing.txt
-
gaffes/anthropoids.txt
-
gaffes/chinked.png.png
-
gaffes/inhibitedScribbly.cmd
-
gaffes/twinkle.db.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 365KB - Virtual size: 365KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 286KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ