Static task
static1
Behavioral task
behavioral1
Sample
246e94f0258821700edf514614448a86303048de25f8b669a133f047b28fe072.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
246e94f0258821700edf514614448a86303048de25f8b669a133f047b28fe072.exe
Resource
win10v2004-20220901-en
General
-
Target
246e94f0258821700edf514614448a86303048de25f8b669a133f047b28fe072
-
Size
558KB
-
MD5
04f04caa228851de13a518a661472300
-
SHA1
b340044403cc3ca1decd0cd44259e0b04b20d707
-
SHA256
246e94f0258821700edf514614448a86303048de25f8b669a133f047b28fe072
-
SHA512
ad98983f10d70981e1557ec4bbe0d870456c8816d1104eb8f1e66859feaa1d890ca9e75998027b3924efc098d55431ae1908cfed0881aa9dcad1049c5280863d
-
SSDEEP
12288:NVNd0OAwH4XMt0bdiW16woxeMhJKS0mKSIEUh:N2OjHuX/UjxeMhJKSTmNh
Malware Config
Signatures
Files
-
246e94f0258821700edf514614448a86303048de25f8b669a133f047b28fe072.exe windows x86
f48fbebf2be403c7796bae1201bf9c05
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
SetStdHandle
ExitProcess
ntdll
RtlRunEncodeUnicodeString
user32
GetOpenClipboardWindow
Sections
.text Size: 551KB - Virtual size: 552KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 261B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE