Static task
static1
Behavioral task
behavioral1
Sample
8ec2fa0c2e472002f769a9383e2da3548c821dd3d59bc083cddab0b5145e19ea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ec2fa0c2e472002f769a9383e2da3548c821dd3d59bc083cddab0b5145e19ea.exe
Resource
win10v2004-20220901-en
General
-
Target
8ec2fa0c2e472002f769a9383e2da3548c821dd3d59bc083cddab0b5145e19ea
-
Size
39KB
-
MD5
841dd9f23bd8e304387dfd410d3f33c6
-
SHA1
2e86c2709a6b5c5de00625c50e96db031d6a0824
-
SHA256
8ec2fa0c2e472002f769a9383e2da3548c821dd3d59bc083cddab0b5145e19ea
-
SHA512
038cce0fadc4ba77641c6b72da03ce475b0529c76ec249d8b65dcb62e7d1f08f8fc6f261ee3b4fb24f2deb2420a062aad0ff8532911d9876c97c4d2ae4a35f69
-
SSDEEP
768:SX10PtvANZiFi5+RcGMG9TNi9UjGG/FUUdxbuaisb6QLuwMSq:Sl0PanOi0KGMG9UWjGGXSmawMS
Malware Config
Signatures
Files
-
8ec2fa0c2e472002f769a9383e2da3548c821dd3d59bc083cddab0b5145e19ea.exe windows x86
4901bd2e91bfa7aed2fa2579c44ab09f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
scsiport.sys
ScsiPortLogError
ScsiPortWriteRegisterUshort
ScsiPortReadRegisterUshort
ScsiPortNotification
ScsiPortStallExecution
ScsiPortGetPhysicalAddress
ScsiPortSetBusDataByOffset
ScsiPortGetBusData
ScsiPortMoveMemory
ScsiPortFreeDeviceBase
ScsiPortGetUncachedExtension
ScsiPortGetDeviceBase
ScsiPortInitialize
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 119B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 384B - Virtual size: 290B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ