Static task
static1
Behavioral task
behavioral1
Sample
6e0ab56f70df74cf8260b85582b0078744b5dcadf6780397e93aa9b132650187.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6e0ab56f70df74cf8260b85582b0078744b5dcadf6780397e93aa9b132650187.exe
Resource
win10v2004-20220901-en
General
-
Target
6e0ab56f70df74cf8260b85582b0078744b5dcadf6780397e93aa9b132650187
-
Size
811KB
-
MD5
11b869b00772bc2dbf340fdb44adec94
-
SHA1
5239586df4f9efffefb4c4be41b077d7162a69c4
-
SHA256
6e0ab56f70df74cf8260b85582b0078744b5dcadf6780397e93aa9b132650187
-
SHA512
9f6444ac6456b66079c9248b34de4d6294f2f5fcbb81eb01048df043902e1204c3e04653f7f8d4c4e4486b73e28d36d3996a045bb6e201c34c4cdf980b655698
-
SSDEEP
24576:zl7cct7gOjnSxnrXTsWVRgGHwadGBZbCZBiC:actfjSJXTsWRgoQHbCZB5
Malware Config
Signatures
Files
-
6e0ab56f70df74cf8260b85582b0078744b5dcadf6780397e93aa9b132650187.exe windows x86
66dd905310c5b83a20f3a3f530bd2ce3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreW
GetFileAttributesW
LoadLibraryA
GlobalFree
GetStartupInfoA
WriteConsoleA
GetTickCount
CreateFileA
GetEnvironmentStringsA
Sleep
SetLocalTime
lstrlenA
GetFileSize
GetModuleFileNameA
DeleteFileA
SetLastError
ReadConsoleA
VirtualProtect
OpenSemaphoreA
GetProcessHeap
CreateDirectoryW
SetLastError
HeapSize
CloseHandle
SetEvent
user32
PeekMessageA
CallWindowProcW
IsZoomed
FindWindowA
DrawTextW
SetFocus
DispatchMessageA
GetWindowLongA
DestroyMenu
GetClassInfoA
GetSysColor
DispatchMessageA
IsWindow
traffic
TcDeleteFilter
TcAddFlow
TcAddFilter
TcDeleteFlow
advapi32
RegCloseKey
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE