Behavioral task
behavioral1
Sample
784-57-0x0000000000400000-0x000000000045D000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
784-57-0x0000000000400000-0x000000000045D000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
784-57-0x0000000000400000-0x000000000045D000-memory.dmp
-
Size
372KB
-
MD5
05c849f4286161b6ac78a4f95a5c19c2
-
SHA1
edc398070e2b52f1f1b593244fe37309181c0b53
-
SHA256
b211476d9a734ae62dc5421e327efd46397bd3153c465496d609d6e7d7f54265
-
SHA512
09400021ec2820213da9c051719fd35c628048eaaca074ba313693b0978faaee38f7d66514b409c6fad3287696d655fb5ce0daea2534717bc0c3732bbd08293b
-
SSDEEP
6144:Udt56eh8ITcleMH9SDomjDBvMYos+CmDyZYIMsCIxl0J8kLMAOHFgduzbgwuTsqN:Udt56ehi/H9SDomjDBvMYojCmDu7Hjgv
Malware Config
Extracted
nymaim
208.67.104.97
85.31.46.167
Signatures
-
Nymaim family
Files
-
784-57-0x0000000000400000-0x000000000045D000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ