Static task
static1
Behavioral task
behavioral1
Sample
0bcd393416a6630432ea48c85e9ddf4b50e369bcb0a416117ab577ff2a266e05.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0bcd393416a6630432ea48c85e9ddf4b50e369bcb0a416117ab577ff2a266e05.exe
Resource
win10v2004-20220812-en
General
-
Target
0bcd393416a6630432ea48c85e9ddf4b50e369bcb0a416117ab577ff2a266e05
-
Size
212KB
-
MD5
2dfb470c9a398ed86148c2db245851e0
-
SHA1
6d14aac5b49c9c8fafc39c7f42ac09b4b82469b7
-
SHA256
0bcd393416a6630432ea48c85e9ddf4b50e369bcb0a416117ab577ff2a266e05
-
SHA512
39fb2fca996eaf3199d9470dc3a488e6d6c83597fc48e79110db7bb0db7ae3d7e70417de4806f3ebb0cccf6700f927fad30e51717675dca93d32ec52eeb6b3b5
-
SSDEEP
3072:NlFYA5EIy/rJ5a4QSL4bEVsz8y81w5XBrZWELmJBuKsEbJbkJNnLcopC9isb:dYfIyjaHUS5FkgBIkmJXzbRcNL13
Malware Config
Signatures
Files
-
0bcd393416a6630432ea48c85e9ddf4b50e369bcb0a416117ab577ff2a266e05.exe windows x86
492e87ae6d61ada6dd4e1a9a8c38ce15
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
OpenSemaphoreA
GetCurrentProcessId
lstrcpyn
lstrcmp
GetFileType
GetLogicalDrives
GetConsoleHardwareState
RegisterWaitForSingleObject
GetCommandLineA
FlushViewOfFile
SetConsoleCursorMode
EndUpdateResourceA
LoadLibraryExA
DeleteTimerQueue
InterlockedExchange
GetCommandLineA
GetSystemDirectoryA
WriteFileGather
DeviceIoControl
LZStart
CancelWaitableTimer
GetSystemTimeAsFileTime
ConnectNamedPipe
CreateDirectoryA
WriteConsoleOutputCharacterA
VirtualAlloc
DeviceIoControl
GetLongPathNameA
GetVolumePathNameA
SetHandleCount
UnlockFile
FindFirstFileExA
ws2_32
recv
Sections
.itext Size: - Virtual size: 988B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 168KB - Virtual size: 834KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ