Static task
static1
Behavioral task
behavioral1
Sample
0c25d95c3102e452a1d6aa29f125ce7c8a87abcd5353e78c55ce5152d9f8d433.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0c25d95c3102e452a1d6aa29f125ce7c8a87abcd5353e78c55ce5152d9f8d433.exe
Resource
win10v2004-20220901-en
General
-
Target
0c25d95c3102e452a1d6aa29f125ce7c8a87abcd5353e78c55ce5152d9f8d433
-
Size
184KB
-
MD5
142e9685f0c68502d6718b1bfc6ba6b8
-
SHA1
b4ea2ca583054f4931c12bbf94f2cb8ff8776264
-
SHA256
0c25d95c3102e452a1d6aa29f125ce7c8a87abcd5353e78c55ce5152d9f8d433
-
SHA512
710874b8842565d08b93eb07a8f9ecfeb30e9eb696f5b1aa30897685cdf37d541a641956b26b0f3e8cce2fc8a7d94849b1c4df92523f2cbf4af4d96cf08bbfc6
-
SSDEEP
3072:3F3mmU5NidosrZmbrNHyZmynnN2tgqy1Hewsk3JZ9VR4yEz84tMbzp:xtU5cdntmOVfR4y14t+p
Malware Config
Signatures
Files
-
0c25d95c3102e452a1d6aa29f125ce7c8a87abcd5353e78c55ce5152d9f8d433.exe windows x86
3e1be9a4d1daa5cadc1dc8e8c80b02fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Heap32ListFirst
GetLocaleInfoA
DeleteCriticalSection
CreateFileW
SetTapePosition
WriteConsoleOutputW
IsBadStringPtrA
GetMailslotInfo
CloseProfileUserMapping
EnumSystemLocalesW
OpenThread
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 51KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 60KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 22KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE