Behavioral task
behavioral1
Sample
1048-57-0x0000000000400000-0x00000000004B0000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1048-57-0x0000000000400000-0x00000000004B0000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1048-57-0x0000000000400000-0x00000000004B0000-memory.dmp
-
Size
704KB
-
MD5
aa384658abbe0222351979258996fd3f
-
SHA1
f6b3e0e88ddee8321bc6fa7aeb862e46ac1b5bed
-
SHA256
3b1b5e6b4d28758be8853b17a94d58e85f99e7c9fd674cdb42ebf8e4ac969618
-
SHA512
6d706bb3fb8c84ce990caafd5f14f989220080e54bd6b783c13d28c7ee2cfce0bc2d86dba0427b4a313da7e7630fc80301a872b0ccc37320bd8cf43de89272f8
-
SSDEEP
12288:2X26sVONAlLRlaFBDLOdk1XxhBNyJTPBLOSfmiSGSunnm:OdhBEASOm9
Malware Config
Extracted
nymaim
208.67.104.97
85.31.46.167
Signatures
-
Nymaim family
Files
-
1048-57-0x0000000000400000-0x00000000004B0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ