Static task
static1
Behavioral task
behavioral1
Sample
bd0037bffe1eadbd96b94ccd1dada3c34404c14a44c5b285aecc6a6e3aa8b4de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd0037bffe1eadbd96b94ccd1dada3c34404c14a44c5b285aecc6a6e3aa8b4de.exe
Resource
win10v2004-20220901-en
General
-
Target
bd0037bffe1eadbd96b94ccd1dada3c34404c14a44c5b285aecc6a6e3aa8b4de
-
Size
76KB
-
MD5
a360aff06808dd8b35059a8f8c3435d0
-
SHA1
92e62d7f491b237100f2755f47e69d032b584716
-
SHA256
bd0037bffe1eadbd96b94ccd1dada3c34404c14a44c5b285aecc6a6e3aa8b4de
-
SHA512
a64a7ee2a814815383ca54f1d4b2b1419564333df238eb8e9ca024ed8504c4fc8c2228987be20532f1ef2673213a89e8220575d289cb62fa712794f630f400be
-
SSDEEP
1536:CAAAAbrGuYZ57pi/38p2pgDm1RemhD6a3qfEehkpjVrs2ryrd1vUQuq6:2dYZK/3tOMhPafxhkHs2qo
Malware Config
Signatures
Files
-
bd0037bffe1eadbd96b94ccd1dada3c34404c14a44c5b285aecc6a6e3aa8b4de.exe windows x86
5567c145991d50013a0ccb5b6331fa04
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
EnumSystemLanguageGroupsW
ReadFileScatter
RtlZeroMemory
SetTapeParameters
MapUserPhysicalPages
SetEvent
lstrlen
EnumCalendarInfoW
SetThreadContext
GetCurrentThread
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE