Static task
static1
Behavioral task
behavioral1
Sample
c58d6582c5d7bd207c081e320d20f48ed290abfffc0566f31795eb19ac0e56d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c58d6582c5d7bd207c081e320d20f48ed290abfffc0566f31795eb19ac0e56d0.exe
Resource
win10v2004-20220901-en
General
-
Target
c58d6582c5d7bd207c081e320d20f48ed290abfffc0566f31795eb19ac0e56d0
-
Size
816KB
-
MD5
3a0417d27fdf7126b1671034fbec2f1e
-
SHA1
d73f1b5669ccb651ef2378d703a65f0daa49d51f
-
SHA256
c58d6582c5d7bd207c081e320d20f48ed290abfffc0566f31795eb19ac0e56d0
-
SHA512
5f141b7ef7d58b4d686a0368702bf39ae0d6973f6156a32d811a893d44168a7b2ee54122ffadad58e25c0f6010f93f42f411c9dab4177fd9e0f8dd6f4b34e66e
-
SSDEEP
24576:qe34uYjggOo2tjAwKYZeLD8cB5iqYB6XYgIK:guYjgY2t0wfer9G6XqK
Malware Config
Signatures
Files
-
c58d6582c5d7bd207c081e320d20f48ed290abfffc0566f31795eb19ac0e56d0.exe windows x86
6571b3a1a3de38717f2f162d43c79c74
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableA
GetCurrentProcess
DeleteFileA
GetTickCount
LeaveCriticalSection
FoldStringW
SetVolumeLabelW
GetStringTypeA
GetFileSize
lstrcpyW
GetCalendarInfoW
GetPrivateProfileIntW
LoadLibraryA
GetConsoleCP
HeapCreate
GetConsoleTitleA
GetComputerNameA
EnterCriticalSection
SetCurrentDirectoryA
adsldpc
FreeADsStr
AllocADsStr
ADSIGetNextRow
AllocADsMem
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 803KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ