Static task
static1
Behavioral task
behavioral1
Sample
01c85adf65c4dc282496f1cc494d4578cbb25b8b64a806442740e1bed2425884.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01c85adf65c4dc282496f1cc494d4578cbb25b8b64a806442740e1bed2425884.exe
Resource
win10v2004-20220901-en
General
-
Target
01c85adf65c4dc282496f1cc494d4578cbb25b8b64a806442740e1bed2425884
-
Size
185KB
-
MD5
7b8f0ee520f4ad7fdd939470c450ad36
-
SHA1
bebf89f4e947e072553dbefbca888d247bcb485f
-
SHA256
01c85adf65c4dc282496f1cc494d4578cbb25b8b64a806442740e1bed2425884
-
SHA512
be826e6b6660892a630d39bc76308f9940713af063ca1492d18d3adc26013e096c4e8f8b9853e5903dbf2888eb89df1a59df55b2e654f9e634c4cc39cca168ee
-
SSDEEP
3072:85bF/pkDNxFDfu7mnc/PAnUSJFQ+V0SsuzJvcuOiMUOzHM8JnTSKIgnFejAiqm:GZ/aDFfoyFQy1suzJz/ybM8JTYCFe5
Malware Config
Signatures
Files
-
01c85adf65c4dc282496f1cc494d4578cbb25b8b64a806442740e1bed2425884.exe windows x86
dc7475abd68863415f7c397aaa9861b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memmove
_CIasin
_CIacos
_CIsqrt
_CIlog
floor
ceil
memcpy
localtime
mktime
strlen
kernel32
GetModuleHandleA
HeapCreate
GetExitCodeProcess
HeapDestroy
ExitProcess
FreeLibrary
GetCurrentProcess
WideCharToMultiByte
HeapFree
HeapAlloc
HeapReAlloc
Sleep
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLocalTime
WriteFile
CloseHandle
ReadFile
wsock32
accept
recvfrom
ntohs
closesocket
WSACleanup
WSAStartup
ioctlsocket
recv
WSAGetLastError
winmm
timeBeginPeriod
timeEndPeriod
Sections
.code Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ