Static task
static1
Behavioral task
behavioral1
Sample
d0c57f25a2dfebfabf705e6f35500ce41af066669c8095c548330228f13eca69.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0c57f25a2dfebfabf705e6f35500ce41af066669c8095c548330228f13eca69.exe
Resource
win10v2004-20220812-en
General
-
Target
d0c57f25a2dfebfabf705e6f35500ce41af066669c8095c548330228f13eca69
-
Size
320KB
-
MD5
3072a8e58bc0b4169880fc923e00cb20
-
SHA1
043adc9cba4d0f56598cbb04198d7351d3da84d2
-
SHA256
d0c57f25a2dfebfabf705e6f35500ce41af066669c8095c548330228f13eca69
-
SHA512
af4def7951fbdff7b5ffac367c4b6f2e45841caa0d5d55423c2dca22ed87fc4146c9811e9524791f3e6a9d66b4d54f8f373d90dd0895f2a2a4ca4e1199b45687
-
SSDEEP
6144:TQNW6Bxxh3H2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:TQc8xn2EB0NxDIBuOFe7/uT
Malware Config
Signatures
Files
-
d0c57f25a2dfebfabf705e6f35500ce41af066669c8095c548330228f13eca69.exe windows x86
57f94996a5c2ee6d80652e22500038be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadProcessMemory
EnumResourceTypesA
CreateDirectoryExA
GetLogicalDriveStringsA
lstrcpynA
SetProcessAffinityMask
GetConsoleAliasExesA
FatalAppExitW
WaitCommEvent
DeleteVolumeMountPointA
InterlockedPushEntrySList
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE