Static task
static1
Behavioral task
behavioral1
Sample
dbd64be9cfe19af0e5916e374815035b0389090a10a092e320b49e9d995653fb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dbd64be9cfe19af0e5916e374815035b0389090a10a092e320b49e9d995653fb.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
dbd64be9cfe19af0e5916e374815035b0389090a10a092e320b49e9d995653fb_dump_0x00090000.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
dbd64be9cfe19af0e5916e374815035b0389090a10a092e320b49e9d995653fb_dump_0x00090000.exe
Resource
win10v2004-20220812-en
General
-
Target
dbd64be9cfe19af0e5916e374815035b0389090a10a092e320b49e9d995653fb.zip
-
Size
657KB
-
MD5
71caab31699bc14684d54934f46d8669
-
SHA1
b45b8249b853a33b4b5e9848af4e2bb03397dc3c
-
SHA256
94f0897672b68345af9ac0d598faac4aeb11a5bdd416c73d4f0d3b1071e784ce
-
SHA512
590d839beb7fccbc3f974e8e283964ffd1250f1746ea685d5281adf6839b43e0adee5083e1685fb70d2e8cb6a28fab7b06aaceff4832ba1bc672b31890c0480d
-
SSDEEP
12288:Y5UIin/Fe94ctyAwLTuXMS14zDlnLpy9zJzvVGBz2UJozVE4S6poOpKw:Yutc94Lc714zDlnYwBzfJozVE4Jms
Malware Config
Signatures
Files
-
dbd64be9cfe19af0e5916e374815035b0389090a10a092e320b49e9d995653fb.zip.zip
Password: infected
-
dbd64be9cfe19af0e5916e374815035b0389090a10a092e320b49e9d995653fb.exe windows x86
Password: infected
df370271488bfbdef7562401695fbc8f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
fopen
fseek
fclose
wcslen
fmod
fabs
ceil
malloc
floor
free
_wfopen
exit
__p__iob
fprintf
sprintf
fwrite
fflush
ferror
getenv
sscanf
memmove
kernel32
GetModuleHandleW
HeapCreate
HeapDestroy
ExitProcess
GlobalAlloc
GlobalFree
CloseHandle
Sleep
FreeLibrary
HeapAlloc
HeapFree
TlsAlloc
TlsSetValue
LoadLibraryW
GetProcAddress
GetVersionExW
WideCharToMultiByte
HeapReAlloc
user32
GetDC
ReleaseDC
DrawIconEx
FillRect
DestroyIcon
gdi32
GetDeviceCaps
SetTextColor
SetTextAlign
SetBkColor
SelectObject
CreateSolidBrush
DeleteObject
CreatePen
SetPixelV
Rectangle
RoundRect
Ellipse
GetStockObject
SetROP2
SetBkMode
GetObjectW
SelectPalette
RealizePalette
GetDIBits
GetObjectType
CreateCompatibleDC
SetStretchBltMode
StretchDIBits
BitBlt
StretchBlt
DeleteDC
MoveToEx
TextOutW
CreateFontIndirectW
GetPixel
ExtFloodFill
LineTo
GetTextExtentPoint32W
GetTextMetricsW
CreateCompatibleBitmap
CreateDIBSection
CreateBitmap
SetPixel
wsock32
closesocket
WSACleanup
WSAStartup
getpeername
Sections
.code Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 316KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
dbd64be9cfe19af0e5916e374815035b0389090a10a092e320b49e9d995653fb_dump_0x00090000.exe windows x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.x64 Size: 392KB - Virtual size: 392KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.params Size: 1024B - Virtual size: 529B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ