Static task
static1
Behavioral task
behavioral1
Sample
b5fe587ee662410ed36900829713194c1e86dd979c71066e8eefd1c3ee727d55.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5fe587ee662410ed36900829713194c1e86dd979c71066e8eefd1c3ee727d55.exe
Resource
win10v2004-20220901-en
General
-
Target
b5fe587ee662410ed36900829713194c1e86dd979c71066e8eefd1c3ee727d55
-
Size
495KB
-
MD5
0f759bb31f6b53f0b48fdd5492dd6ef0
-
SHA1
fde33664243f6d2b38d65bb3ac227097f8f2d4b4
-
SHA256
b5fe587ee662410ed36900829713194c1e86dd979c71066e8eefd1c3ee727d55
-
SHA512
36b01b4d2d62ce42d1053eaf9ad978600293d4bc5ccd3802b32268596fea65d908c652ffd484bf0cfa8f00365b460a1ab7511af29b081c90307605e2ef3e4e15
-
SSDEEP
6144:ZnH3Qb3QmfD8VJhla7rESDLZJVxcRSox1B2fTAY+idAtPo:ZnH3Q3QmfD8VJh87rlDLbop1B2k2WtPo
Malware Config
Signatures
Files
-
b5fe587ee662410ed36900829713194c1e86dd979c71066e8eefd1c3ee727d55.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 708B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.exc Size: 512B - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 291KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 8KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.xur Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE