Behavioral task
behavioral1
Sample
1776-365-0x0000000010590000-0x000000001060E000-memory.exe
Resource
win7-20220812-en
General
-
Target
1776-365-0x0000000010590000-0x000000001060E000-memory.dmp
-
Size
504KB
-
MD5
73c1a0b01820bc3e58c0b8d4ae3732e2
-
SHA1
da1ecb7beaf25ec6f3acab00dea929d8d314d491
-
SHA256
7bc4e8c04bd8d0402032c6490c3f76e1db7f9183cc1bd23380a2a1f7eb544baf
-
SHA512
3c7342b43136a1163cb075d38c2fa0a9c1db0d38ecded753d4ad439fb43b37160c924614e873db824e70396cd4202b37e406cae522857cd07a3ce7072c4a224b
-
SSDEEP
6144:UOFBH/FMNjt18F+9a/NgAeDB4CcOtKp03b13a4LJ+sAOZZPWXbTcUkyg:UOFtiNBuFgawDB4NOmuwsfZP3yg
Malware Config
Signatures
-
Remcos family
Files
-
1776-365-0x0000000010590000-0x000000001060E000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.text Size: 465KB - Virtual size: 492KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE