Behavioral task
behavioral1
Sample
836-57-0x0000000000400000-0x0000000000594000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
836-57-0x0000000000400000-0x0000000000594000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
836-57-0x0000000000400000-0x0000000000594000-memory.dmp
-
Size
1.6MB
-
MD5
d153d9bbe9e2b2a52235c544f05c970c
-
SHA1
105a5937683880e67253078b2b60adef7ad5f8f8
-
SHA256
755671d673c9cf8cd4f7699b6fa4b128d47832843bfbcdbd669abb724bb09f03
-
SHA512
71e6a5a6fa73c273d432daa3b48010c66262b6a7b7f29e78af99b87463ab686664f6f65029d95fabeb46beaf4159eb3dcc9347d9163cde8da8bbea87c2682f63
-
SSDEEP
6144:Udt56eh8ITcleMH9SDomjDBvMYos+CmDyZYIMsCIxl0J8kiMAOmDg:Udt56ehi/H9SDomjDBvMYojCmDu70wg
Malware Config
Extracted
nymaim
208.67.104.97
85.31.46.167
Signatures
-
Nymaim family
Files
-
836-57-0x0000000000400000-0x0000000000594000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ