Static task
static1
Behavioral task
behavioral1
Sample
47db4b0e00dd6d2530566567725ea0711732bba310f71292cadab4d4b84f36fb.exe
Resource
win7-20220901-en
General
-
Target
47db4b0e00dd6d2530566567725ea0711732bba310f71292cadab4d4b84f36fb
-
Size
42KB
-
MD5
a02c65fa4c9caec2f75df259386fa6d0
-
SHA1
67cfbfc7b6e6a0980991009b4477f9ba7c9675f5
-
SHA256
47db4b0e00dd6d2530566567725ea0711732bba310f71292cadab4d4b84f36fb
-
SHA512
2d952df085e6f7bb59c4c1455796051f1c29d2f188a768b2a913797f3699847991a71b830ec4031739c5aa343efed8b0a6fec7548a3f1fe9596abc7a7c59efce
-
SSDEEP
768:phxqqLdW508lEmj6HL6VBJaVin5rDW9HleuX8OXYo7XjtpnBgtzq2DMAgt:f4YWfODL6b4M5+9FQzOA+
Malware Config
Signatures
Files
-
47db4b0e00dd6d2530566567725ea0711732bba310f71292cadab4d4b84f36fb.exe windows x86
d8830768e26d5542e5a19dad95d6bbc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
ExitProcess
user32
FindWindowA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE