Static task
static1
Behavioral task
behavioral1
Sample
1a48ddd20431fa358ce515b958166e277bd926ee500f7f50c1bf73b9976665d9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1a48ddd20431fa358ce515b958166e277bd926ee500f7f50c1bf73b9976665d9.exe
Resource
win10v2004-20220901-en
General
-
Target
1a48ddd20431fa358ce515b958166e277bd926ee500f7f50c1bf73b9976665d9
-
Size
816KB
-
MD5
5ee9c120f5ae7b1c514bfc3b22b124b0
-
SHA1
1c337ab85d5c6cda0fd16d4aab5923d4551d45fe
-
SHA256
1a48ddd20431fa358ce515b958166e277bd926ee500f7f50c1bf73b9976665d9
-
SHA512
fdb284a927486031ecea60fd2933cd54c94003c12a186340e0d942a58e1ddb733de7190faf835f0dd9f59af5e24bc95bf394edf667047156b4ed3031f26c939f
-
SSDEEP
24576:hGSdxukif7e7UzojlgcKg8gSFoZy2yzAx+i7E:wSarje7Uz8laPCFhE
Malware Config
Signatures
Files
-
1a48ddd20431fa358ce515b958166e277bd926ee500f7f50c1bf73b9976665d9.exe windows x86
74d2537499338b779c5eea6d46648103
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetVolumePathNameA
GetFileSize
GetDriveTypeW
GetDriveTypeW
OpenMutexA
MoveFileA
GetDriveTypeW
lstrlenA
GetVolumeInformationW
GetCurrentDirectoryW
GetDriveTypeW
LoadLibraryA
FindResourceW
GetDriveTypeW
VirtualAlloc
GetDriveTypeW
netshell
HrLaunchConnection
HrGetIconFromMediaType
HrCreateDesktopIcon
HrRenameConnection
Sections
.play Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.odata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_WRITE
.ydata Size: 801KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ