Behavioral task
behavioral1
Sample
48a1c78d90476f38a1b46a2873fd419982c60c0245a47f9ce62e907d1678ed25.exe
Resource
win7-20220812-en
General
-
Target
48a1c78d90476f38a1b46a2873fd419982c60c0245a47f9ce62e907d1678ed25
-
Size
125KB
-
MD5
766e943676f83d83fb12f58b9aa9824e
-
SHA1
7886ffb8dbac4e92a711ade59f4fac163a9290e1
-
SHA256
48a1c78d90476f38a1b46a2873fd419982c60c0245a47f9ce62e907d1678ed25
-
SHA512
3a7d48d59f8ad6eac7cc2e071dc0960360efbc77cf4447f3759dec8281c880c5fe3f57a3f8d923acd2efe827629f8132f9c194cb71a1b97f2422fb1cdb0e9d23
-
SSDEEP
3072:mVi7tfCMMbBa8lOub804F8iHr5nuFEin9ZIMb1zx5RsaBK:8i7gBBNiLJuF59ZIM9G4
Malware Config
Signatures
Files
-
48a1c78d90476f38a1b46a2873fd419982c60c0245a47f9ce62e907d1678ed25.exe windows x86
c5b7709816c290ebf1b7e56f0f8b72af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
LoadLibraryA
VirtualProtect
GetModuleFileNameA
advapi32
EnumServicesStatusA
crtdll
_getch
gdi32
GetStockObject
iphlpapi
SetTcpEntry
netapi32
NetApiBufferFree
odbc32
SQLDriverConnect
shell32
SHGetPathFromIDListA
user32
GetForegroundWindow
MessageBoxA
wininet
InternetCloseHandle
ws2_32
htons
wtsapi32
WTSQuerySessionInformationA
Sections
UPX0 Size: - Virtual size: 320KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ