Static task
static1
Behavioral task
behavioral1
Sample
dbd39f1925d1ca740fb7ffaeea22a50f8263c2aaebe6ca794bcc143b907a0d7f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dbd39f1925d1ca740fb7ffaeea22a50f8263c2aaebe6ca794bcc143b907a0d7f.exe
Resource
win10v2004-20220901-en
General
-
Target
dbd39f1925d1ca740fb7ffaeea22a50f8263c2aaebe6ca794bcc143b907a0d7f
-
Size
71KB
-
MD5
44542c645e9872c4cb940730749a5670
-
SHA1
3667b7d12aacf6b432619b22945f2dc4033959e7
-
SHA256
dbd39f1925d1ca740fb7ffaeea22a50f8263c2aaebe6ca794bcc143b907a0d7f
-
SHA512
53e71558403a5a327d74bee126d0e28bd01ec87b7e860ce978e5a0f5a0b38f90306c049ed3718b5183d4853f185b7bee8ae642567a395a4dd010f2caf6f3195b
-
SSDEEP
1536:mm1uea40zd4YYe9iNBug0BPVk9iSaooFYc6Hy6XY24gf3wT66vlmPBq20/:m4uea40zdhFiNIg089iWc6H/RJ3wT66d
Malware Config
Signatures
Files
-
dbd39f1925d1ca740fb7ffaeea22a50f8263c2aaebe6ca794bcc143b907a0d7f.exe windows x86
41d2c391b3c508db178f84fd384fe1a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateMutexA
ExitProcess
GetLastError
InterlockedIncrement
ReleaseMutex
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
WaitForSingleObject
msvcrt
_close
_fileno
_fstat
_isatty
_lseek
_open
_read
_write
_HUGE
__getmainargs
__mb_cur_max
__p__environ
__set_app_type
_assert
_cexit
_errno
_fileno
_fmode
_fpreset
_iob
_isctype
_pctype
_setmode
abort
atexit
fclose
fflush
fread
free
fseek
fwrite
getc
malloc
memchr
memcpy
memmove
signal
strcmp
strtol
strtoul
system
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 1008B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE