Static task
static1
General
-
Target
qbot.zip
-
Size
649KB
-
MD5
27543cfce9af267f4a579899876090be
-
SHA1
258980fee88fb6ee2938e7c16f9bce5b8c5ec9d9
-
SHA256
ab31f7299210a94a8af0bcc1192700cccf7721bb4d878a10466c8154acffabe7
-
SHA512
acef390148730224663843e96963ae04e18c1a3e6d150ec6f7278bd8257e316acfa914f6deae77751328310bcc4f2bb007eecc2fb046cc3eddfa09ccf6d66937
-
SSDEEP
12288:OIQUFgjNT/5nLeSxQOfSoH/1HnWt61rW8DGTcmhcD9DlYd3J76TAax+EqY:ViTQuSoH/xWtWDwtd36AavqY
Malware Config
Signatures
Files
-
qbot.zip.zip
-
ContractCopy_5572.iso.iso .js
-
7965/2623.cmd
-
7965/8369.js.js
-
7965/dukedom.jpg.jpg
-
7965/emulsifying.dat.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 416KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 283KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
ContractCopy.lnk.lnk
-
Overdue_5785.iso.iso .vbs