Static task
static1
Behavioral task
behavioral1
Sample
c4f3e53e8090f707c53a1c4ebab49a5c3376034e3cfaa9c8745a3a4c8cf6c65c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c4f3e53e8090f707c53a1c4ebab49a5c3376034e3cfaa9c8745a3a4c8cf6c65c.exe
Resource
win10v2004-20220901-en
General
-
Target
c4f3e53e8090f707c53a1c4ebab49a5c3376034e3cfaa9c8745a3a4c8cf6c65c
-
Size
693KB
-
MD5
7418800e921a8309cdefc04f9ec4b871
-
SHA1
0533cf54a5f3c90ec637582da03d0266fad04297
-
SHA256
c4f3e53e8090f707c53a1c4ebab49a5c3376034e3cfaa9c8745a3a4c8cf6c65c
-
SHA512
aabbbec362e6522b29a29c07e09ad181140cfd88a62ae01849115b398945a2eee4dced8f63cbed0cdfba3aca2e08788d3320d2ddf2ae467066c30691e491ce7e
-
SSDEEP
12288:inaKawSQQ+G5Z5syS5syS5syC+G5sy8eeeQ+AM5syS5Z5Z5Z5Beu:ai22w8eeesAMeu
Malware Config
Signatures
Files
-
c4f3e53e8090f707c53a1c4ebab49a5c3376034e3cfaa9c8745a3a4c8cf6c65c.exe windows x86
3b8d3c98008d85f34284e7b55e35cc4b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAStartup
socket
gethostbyname
htons
connect
send
closesocket
WSACleanup
kernel32
GetStdHandle
SetErrorMode
GetStartupInfoA
GetModuleHandleA
GetConsoleWindow
CreateFileMappingA
GetLastError
CreateThread
GetTickCount
lstrlenA
lstrcatA
lstrcpyA
LoadLibraryA
GetProcAddress
SetConsoleTextAttribute
AllocConsole
FreeConsole
GetVolumeInformationA
GetTempFileNameA
GetModuleFileNameA
GetTempPathA
CreateProcessA
Sleep
user32
ShowWindow
msvcrt
_controlfp
_strdup
fwrite
__set_app_type
__p__fmode
__p__commode
sprintf
fclose
fgets
fopen
_except_handler3
malloc
_unlink
fputs
setvbuf
_iob
_fdopen
_open_osfhandle
strlen
strcat
rand
strcpy
strstr
strrchr
strcmp
ftell
fseek
memset
strtok
srand
__argv
__argc
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
Sections
.bss Size: - Virtual size: 47KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE