Static task
static1
Behavioral task
behavioral1
Sample
ecbb276d711a93ca9786cfe25db414ba0bebeecbd50de7653d928d765e80c5ae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ecbb276d711a93ca9786cfe25db414ba0bebeecbd50de7653d928d765e80c5ae.exe
Resource
win10v2004-20220812-en
General
-
Target
ecbb276d711a93ca9786cfe25db414ba0bebeecbd50de7653d928d765e80c5ae
-
Size
236KB
-
MD5
6b0f265be9f4826957cf58d7452bfe30
-
SHA1
2c19cd297c03e6557c6fc5e1268a1055380152e7
-
SHA256
ecbb276d711a93ca9786cfe25db414ba0bebeecbd50de7653d928d765e80c5ae
-
SHA512
dde5b42e6b86ba9505b02d2720943f69dd8e0d42a39aaa6d67e16f06c2f2d88b510e3f10e249e97b3348d4abea43dec0dae3cf79f7d17cf1eed0eb64014e9173
-
SSDEEP
6144:8mjiZAfUt+9jBXOI8O8igcjAeMEz9PqqnvCF1SdHP:8sIAY+TOTO8+IEz9PqWaF18HP
Malware Config
Signatures
Files
-
ecbb276d711a93ca9786cfe25db414ba0bebeecbd50de7653d928d765e80c5ae.exe windows x86
31d288880bf91724434417cff7bc76a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_wcsnicmp
wcsncmp
wcsncpy
_wcsdup
free
wcscmp
memmove
memcpy
wcslen
kernel32
GetModuleHandleW
HeapCreate
HeapDestroy
ExitProcess
GetTickCount
Sleep
SuspendThread
TerminateProcess
CloseHandle
InitializeCriticalSection
GetModuleFileNameW
HeapFree
HeapAlloc
HeapSize
FreeLibrary
LoadLibraryW
WideCharToMultiByte
GetProcAddress
WriteFile
CreateFileW
GetFileSize
ReadFile
HeapReAlloc
ntdll
NtUnmapViewOfSection
Sections
.code Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 38B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.4aox Size: 221KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ