Static task
static1
Behavioral task
behavioral1
Sample
1efc261e51a9d27900e77beeaa6f34fbd0b039ec6a959f379679bddfc6138871.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1efc261e51a9d27900e77beeaa6f34fbd0b039ec6a959f379679bddfc6138871.exe
Resource
win10v2004-20220812-en
General
-
Target
1efc261e51a9d27900e77beeaa6f34fbd0b039ec6a959f379679bddfc6138871
-
Size
938KB
-
MD5
2b27a3b63d67024ee567fe1d6e9134a0
-
SHA1
c99749f357cd7e0cc5d2cada699e82e296b2913f
-
SHA256
1efc261e51a9d27900e77beeaa6f34fbd0b039ec6a959f379679bddfc6138871
-
SHA512
5cf1502edbe3c28497f2abfdf92c12728f07e9e0a4979aafea74d786043f216cb55f04c07073548bcef9b1c5e7121f972e1df1f482c1731f101f5e94ea981e9e
-
SSDEEP
24576:tXunU6Uso5dtvf90j7NfmQjBR5YtFSnupayrQuv7Vq7ID:tXAxGj90nNLBRKAnQVPnD
Malware Config
Signatures
Files
-
1efc261e51a9d27900e77beeaa6f34fbd0b039ec6a959f379679bddfc6138871.exe windows x86
256b775b96671fd0c95ee119a776e723
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlLargeIntegerSubtract
kernel32
IsDebuggerPresent
GetCurrentProcessId
user32
GetActiveWindow
GetClipboardViewer
Sections
.text Size: 936KB - Virtual size: 936KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE