Static task
static1
Behavioral task
behavioral1
Sample
c6896cdb6ff0569dfcc23ac23b2ec7df3a7fcd9a67f44168f7e05c2c0bf28669.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6896cdb6ff0569dfcc23ac23b2ec7df3a7fcd9a67f44168f7e05c2c0bf28669.exe
Resource
win10v2004-20220812-en
General
-
Target
c6896cdb6ff0569dfcc23ac23b2ec7df3a7fcd9a67f44168f7e05c2c0bf28669
-
Size
1.6MB
-
MD5
c50189e45abfb852a9588bc4cd448ddc
-
SHA1
f3304cbfe4da8f69e929d39a996c3117dcb3dac8
-
SHA256
c6896cdb6ff0569dfcc23ac23b2ec7df3a7fcd9a67f44168f7e05c2c0bf28669
-
SHA512
f950a150f5dd867b21ec94e4cb9a449909a8e098c7a91a9988c43ca2f69b83c14b769b12b7c7bc27cfa0791853f7ca081f08187bad15a87c528955b01e388dbf
-
SSDEEP
24576:cNMfoMiVNzOeJr7W43IAVda9YQNOr/GZvAzYMO1wHPiCSqBxqp7OtXFIcYYEQfrw:cNjNbNWlAvaGQxkkMCqXk7OlFX3W
Malware Config
Signatures
Files
-
c6896cdb6ff0569dfcc23ac23b2ec7df3a7fcd9a67f44168f7e05c2c0bf28669.exe windows x86
c9fd3447e26d74badca25325828f8aa7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamOut
ws2_32
WSAAsyncSelect
rasapi32
RasHangUpA
kernel32
VirtualFree
user32
DestroyAcceleratorTable
gdi32
ExtSelectClipRgn
winspool.drv
OpenPrinterA
advapi32
RegQueryValueExA
shell32
ShellExecuteA
ole32
OleRun
oleaut32
VariantInit
comctl32
ord17
wininet
InternetCanonicalizeUrlA
comdlg32
GetSaveFileNameA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 616KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1016KB - Virtual size: 1016KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ