Static task
static1
Behavioral task
behavioral1
Sample
bdecaf102a40efa88f5affd3541d25fe086240021f9e6e3a5002e77ee4dc9f91.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdecaf102a40efa88f5affd3541d25fe086240021f9e6e3a5002e77ee4dc9f91.exe
Resource
win10v2004-20220812-en
General
-
Target
bdecaf102a40efa88f5affd3541d25fe086240021f9e6e3a5002e77ee4dc9f91
-
Size
496KB
-
MD5
6e0dd14c905f89ac0523ddd6581e4620
-
SHA1
34a0b8e981057a4da539f1ff10131068546d9f9f
-
SHA256
bdecaf102a40efa88f5affd3541d25fe086240021f9e6e3a5002e77ee4dc9f91
-
SHA512
e579e9cefca06a6c86f19590583fe7fc441cf4e8e4b3f7200931cfe00c859a1f7b744fe19b9c34602c33d82faaa85251e87cf0c4abf1c5b1ab746236ff07c4cf
-
SSDEEP
12288:ZXY5o5o9hrwn+1CHUYQimDa1e+cKXmQJ9BrgHg5/jA1qX:ZXY5Kob0ek9MMhXvJ9BUASy
Malware Config
Signatures
Files
-
bdecaf102a40efa88f5affd3541d25fe086240021f9e6e3a5002e77ee4dc9f91.exe windows x86
cb3d01b6c1401aee3fbdb683330e43f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlIsGenericTableEmpty
DbgQueryDebugFilterState
NtQuerySymbolicLinkObject
user32
GetClipboardOwner
CreateAcceleratorTableA
GetClipboardViewer
Sections
.text Size: 489KB - Virtual size: 492KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 310B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE