Static task
static1
Behavioral task
behavioral1
Sample
3a24ab75e8b67aee891220920c813f6c970bd811317437a48222c05153e1429e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3a24ab75e8b67aee891220920c813f6c970bd811317437a48222c05153e1429e.exe
Resource
win10v2004-20220812-en
General
-
Target
3a24ab75e8b67aee891220920c813f6c970bd811317437a48222c05153e1429e
-
Size
34KB
-
MD5
6e0660ebe41617c579a2c1fbda493880
-
SHA1
7278c36ed84b11a4faffcc2866fe2cc108fa9d56
-
SHA256
3a24ab75e8b67aee891220920c813f6c970bd811317437a48222c05153e1429e
-
SHA512
ea202071f9edb8568098f824fd8d30b23715a6057021c6347d25b176faf85c07c803d771108b8e9d4e662595bccdbb8a332c2bd2135cad9e16565a003ce3a2dd
-
SSDEEP
768:cUo868R8Z8W88m8E8Qv97O0n40zB60auf/hS5EHzb+vtdU7q1g/j:Gzq+ERpfv97O0n3d6pufpS5ETKF31gb
Malware Config
Signatures
Files
-
3a24ab75e8b67aee891220920c813f6c970bd811317437a48222c05153e1429e.exe windows x86
6937104624d32095d6ab3c45612b3a11
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strlen
strncpy
memcpy
malloc
free
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapFree
WriteFile
CloseHandle
SetFilePointer
HeapReAlloc
HeapAlloc
CreateFileA
ReadFile
user32
MessageBoxA
wsock32
getpeername
ntohs
closesocket
WSACleanup
WSAStartup
Sections
.code Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ