Behavioral task
behavioral1
Sample
b0e5023e77962ffeee611d3a612d589d30d209f0b9441606ba2f85aa279b74a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0e5023e77962ffeee611d3a612d589d30d209f0b9441606ba2f85aa279b74a8.exe
Resource
win10v2004-20220812-en
General
-
Target
b0e5023e77962ffeee611d3a612d589d30d209f0b9441606ba2f85aa279b74a8
-
Size
24KB
-
MD5
64a488699b4b7fe8fa48f853aa3bca30
-
SHA1
169daaf8e259c7e7b6abf1b9312747767e38556a
-
SHA256
b0e5023e77962ffeee611d3a612d589d30d209f0b9441606ba2f85aa279b74a8
-
SHA512
e58930954be46bf1b329fd761f12feca9c9b4fabeb24f59a6c9551cd7ec43ec880850ffc3e57a7fb488f1869c376ee615ff3fcf45c01eec62062a9ce6a8dbeb6
-
SSDEEP
96:nP3Ur+89nXDnXgnXDMHT++WxAMWuX6jVyqgom2QVO8vAK2tJZ2f:nM+84Mz+NAMuFW2B8vAK2tJZ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b0e5023e77962ffeee611d3a612d589d30d209f0b9441606ba2f85aa279b74a8.exe windows x86
92e434bb4b9ad9e142a7cfb2653657bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
VirtualAlloc
WriteFile
GetSystemDirectoryA
CopyFileA
DeleteFileA
GetModuleFileNameA
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
GetCurrentThread
ExitProcess
GetProcAddress
GetModuleHandleA
CreateFileA
ReadFile
CloseHandle
SetCurrentDirectoryA
SetErrorMode
SetThreadPriority
Sleep
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
msvfw32
ICSendMessage
user32
PeekMessageA
wininet
InternetGetConnectedState
wsock32
recv
gethostname
gethostbyname
connect
closesocket
WSAStartup
WSACleanup
socket
send
Sections
UPX0 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE