Behavioral task
behavioral1
Sample
1640-66-0x0000000000400000-0x0000000000456000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1640-66-0x0000000000400000-0x0000000000456000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1640-66-0x0000000000400000-0x0000000000456000-memory.dmp
-
Size
344KB
-
MD5
4dcb770397aafd1e5ab88ce29f1a21d2
-
SHA1
a013a6a4b3e937a8dd2c01359d2719ae2d702f31
-
SHA256
2e5a1c60dd8c0c359dead750dc382e2c47117c1a62bb084675bb848bfcada2bb
-
SHA512
60fca15d2b90bf11f2948c044e6d37de384c9ac07a432ed710f122030b31a6b7dd59e5ae8a4a0dc527e52c06ec429b1c3983191656a80590a9580311087ba30c
-
SSDEEP
6144:4kaKWRntdC6B0lEeJu6SSzCCRfbualcSa:4kPWRts6Be7A6SJCRDwS
Malware Config
Signatures
-
Nanocore family
Files
-
1640-66-0x0000000000400000-0x0000000000456000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ