Static task
static1
Behavioral task
behavioral1
Sample
669088c622e8da244c4305a49cd163081b40f8cc5e72569717ee055d8d0d18f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
669088c622e8da244c4305a49cd163081b40f8cc5e72569717ee055d8d0d18f1.exe
Resource
win10v2004-20220812-en
General
-
Target
669088c622e8da244c4305a49cd163081b40f8cc5e72569717ee055d8d0d18f1
-
Size
62KB
-
MD5
91a9b821076ecd8ecb04429752aa4900
-
SHA1
b6f9acb40e9c7c127253498a2447136d0e9ef015
-
SHA256
669088c622e8da244c4305a49cd163081b40f8cc5e72569717ee055d8d0d18f1
-
SHA512
73b7292bb05adb27f70ca918891cb672d79c9584eae212c705338ea8e1faf7123c873f64279a8cdde57c4ddf135d36dfa03b67e8636aee56b2199650a9f8e7f0
-
SSDEEP
1536:5N3Zz+sEqOQe3MeR2Qv0S/Kma++TUCsLSAGrWw1b4W:acl7Qd/KHThs26w6W
Malware Config
Signatures
Files
-
669088c622e8da244c4305a49cd163081b40f8cc5e72569717ee055d8d0d18f1.exe windows x86
f52e0486e16ee4a7ecb383b3d2778e21
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryExW
GetStartupInfoA
IsBadStringPtrA
OutputDebugStringW
GetConsoleOutputCP
lstrcatA
WriteProcessMemory
SetSystemTime
MulDiv
FindActCtxSectionStringA
CreateMailslotW
Heap32Next
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 47KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE