Static task
static1
Behavioral task
behavioral1
Sample
ee41856031d3088391bc3c15094bd7ad5a3ca57d4f172d666c53ccb755cca3d2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ee41856031d3088391bc3c15094bd7ad5a3ca57d4f172d666c53ccb755cca3d2.exe
Resource
win10v2004-20220812-en
General
-
Target
ee41856031d3088391bc3c15094bd7ad5a3ca57d4f172d666c53ccb755cca3d2
-
Size
63KB
-
MD5
672ef4d7134924308905012db64ea950
-
SHA1
ec5b7ee7b196b1d7689089834ddfa35824e54e70
-
SHA256
ee41856031d3088391bc3c15094bd7ad5a3ca57d4f172d666c53ccb755cca3d2
-
SHA512
6cd6122a18a7186b8c73c4bfc799ea99ee4aa58dbb4665b78669278b70563d82029a6811ddbda39ae0013a314ab7b868d2cc9669e2c1be38234704d159375035
-
SSDEEP
1536:jrRSRDGQYUYk4LmAl0Jxd48d4DBNa07IA4zJAGP:jchGQYUimAW3q5Na07t4zJAu
Malware Config
Signatures
Files
-
ee41856031d3088391bc3c15094bd7ad5a3ca57d4f172d666c53ccb755cca3d2.exe windows x86
5d5bcb0541779697af83e517dbfab2c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Module32FirstW
RtlUnwind
LZClose
DeleteFileA
Beep
GetFileSizeEx
LZRead
GlobalAlloc
GetCurrentProcessId
FoldStringW
GetDiskFreeSpaceExA
CreateRemoteThread
ScrollConsoleScreenBufferW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 49KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE