Static task
static1
Behavioral task
behavioral1
Sample
a1b6d28853003498b63a587318347a37bd545af601af283706560ca468a05569.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a1b6d28853003498b63a587318347a37bd545af601af283706560ca468a05569.exe
Resource
win10v2004-20220901-en
General
-
Target
a1b6d28853003498b63a587318347a37bd545af601af283706560ca468a05569
-
Size
440KB
-
MD5
770982f24808aedca9bf4710ec62bff0
-
SHA1
e15501f7484bfc4570c47acf55ae4f7190a2003f
-
SHA256
a1b6d28853003498b63a587318347a37bd545af601af283706560ca468a05569
-
SHA512
aa47c14c190d06dedc485aa2fab7cd52011e1bf02fab0540bdf7fa16c7bdc705ac6a62f2b50532fcfbae78b68ee2b191f8107c1c14fd53fc82fa06aeeb5dec17
-
SSDEEP
12288:pyEN6FMmZCfALUIlyai2MxbDNYFJZ2eAlEwPeLr9P:pyElf+1y2qbDNmaQrp
Malware Config
Signatures
Files
-
a1b6d28853003498b63a587318347a37bd545af601af283706560ca468a05569.exe windows x86
6e549f05efbef8458bd151632acfa23b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
ZwClearEvent
NtInitializeRegistry
kernel32
GetVersion
user32
GetCapture
GetClipboardSequenceNumber
Sections
.text Size: 433KB - Virtual size: 436KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 177B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE