Behavioral task
behavioral1
Sample
d2ac86304745bae602c585278c426ddd3762e09cd3f18ef0f54f24652c050b5e.exe
Resource
win7-20220812-en
General
-
Target
d2ac86304745bae602c585278c426ddd3762e09cd3f18ef0f54f24652c050b5e
-
Size
112KB
-
MD5
78fcc87a19842758bed9edaa1f753ee0
-
SHA1
2061da061cab968c14034d5c762c5eb8204dd85b
-
SHA256
d2ac86304745bae602c585278c426ddd3762e09cd3f18ef0f54f24652c050b5e
-
SHA512
3fdfd63f2244ea10f779a79ebe6eae358e79049dbeaea6f4ea2418f5ccd8c5b32185c08fc5c3804208e0e1f0bd8e7a761c041ca3dbf88c26dacc98ba9012e383
-
SSDEEP
1536:TKRcDtcoJqTTi3YUZ7ozn6uI61Os110mEkOZdkmtMTvHEKokzmt0E01Y:mRu3qdI6NO79QEKUt0ru
Malware Config
Extracted
pony
http://216.244.80.27/pony/gate.php
Signatures
Files
-
d2ac86304745bae602c585278c426ddd3762e09cd3f18ef0f54f24652c050b5e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE