Static task
static1
Behavioral task
behavioral1
Sample
1dbf5a8a41ccaa820dbf06afa23122b05dfcf6979d44a24ac7281eea73572983.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1dbf5a8a41ccaa820dbf06afa23122b05dfcf6979d44a24ac7281eea73572983.exe
Resource
win10v2004-20220812-en
General
-
Target
1dbf5a8a41ccaa820dbf06afa23122b05dfcf6979d44a24ac7281eea73572983
-
Size
62KB
-
MD5
0c5631622f98c86182dc538e9c766bcf
-
SHA1
bf7cb0514441644b8300577263c4cbd02bc296b1
-
SHA256
1dbf5a8a41ccaa820dbf06afa23122b05dfcf6979d44a24ac7281eea73572983
-
SHA512
3eed5f4632639313d79a72a9c1141578a5162bd61cab10a264b6d52cda4900dab38cbee4234b4b85e6466c7d139ce201fd2d0eed9bd6eb5c82f26a10a9ace18e
-
SSDEEP
1536:0Ow0YVTqtZQk51EX+mkZ1Jw8JSTbAiw0PyM8g4Kyvgk3dBr:0VNw0y1TfVJJS4iwCS/tg2vr
Malware Config
Signatures
Files
-
1dbf5a8a41ccaa820dbf06afa23122b05dfcf6979d44a24ac7281eea73572983.exe windows x86
c8c4c12b3a3bf997b94e72360d74f1bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleInputW
GetMailslotInfo
WaitNamedPipeW
SetThreadLocale
HeapValidate
CreateNamedPipeW
RtlZeroMemory
SetFileApisToOEM
FindAtomW
GetCalendarInfoA
GetConsoleAliasW
RtlZeroMemory
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 47KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE