Behavioral task
behavioral1
Sample
1572-58-0x0000000000400000-0x0000000000463000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1572-58-0x0000000000400000-0x0000000000463000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1572-58-0x0000000000400000-0x0000000000463000-memory.dmp
-
Size
396KB
-
MD5
c8a06a49ca8d3c2b7474899b68c6b4b7
-
SHA1
6f58cecf1cef7a95f322d68a04545242e32fa60c
-
SHA256
f9585c0d7c07e3028dc694804b5ee70f3fbe297141a6b278f4dfac9a6ae7bb38
-
SHA512
3aab26c4345f667ce072afb9d6aee164d83fbceaac15d10a5a49bf2ee6b4d52411de14e13b7f524ab3f11bd3ac7dff61cb219fd25139ab6d834c8fe04305cfd6
-
SSDEEP
12288:Udt56ehi/H9SDomjDBvMYojCmDu7Syg4Rk:ciXLDf4R
Malware Config
Extracted
nymaim
208.67.104.97
85.31.46.167
Signatures
-
Nymaim family
Files
-
1572-58-0x0000000000400000-0x0000000000463000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ