Static task
static1
Behavioral task
behavioral1
Sample
ac117d3bcc6cebafd154633716f4dea5f850bc995be8ad2e3fe97f2cf7ad9daa.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ac117d3bcc6cebafd154633716f4dea5f850bc995be8ad2e3fe97f2cf7ad9daa.exe
Resource
win10v2004-20220812-en
General
-
Target
ac117d3bcc6cebafd154633716f4dea5f850bc995be8ad2e3fe97f2cf7ad9daa
-
Size
320KB
-
MD5
a156f59d6227cf83e2c2807a478c4130
-
SHA1
0f751981b471602a90033db409df7c0506f37efe
-
SHA256
ac117d3bcc6cebafd154633716f4dea5f850bc995be8ad2e3fe97f2cf7ad9daa
-
SHA512
15944f582efb4d5d0ca234bf4c3895232f614feeca6b4229ee078f23d1d70ef28765c39bd71207d2c1ab74151cb092a8aea232b7b5e93f871ecff547b9e7d4fa
-
SSDEEP
6144:prVMCu2H2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:VVZd2EB0NxDIBuOFe7/uT
Malware Config
Signatures
Files
-
ac117d3bcc6cebafd154633716f4dea5f850bc995be8ad2e3fe97f2cf7ad9daa.exe windows x86
bc6d57f0621cd724f7798c312e0d1a9c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomW
GetCurrentProcessId
GetStringTypeExA
CreateActCtxA
AttachConsole
BaseProcessInitPostImport
IsProcessorFeaturePresent
GetTapePosition
GetVolumeNameForVolumeMountPointA
EnumerateLocalComputerNamesA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE