Static task
static1
Behavioral task
behavioral1
Sample
88115da8a2797c5a09d954d49147e9fe3629747b834ddff8d56118177cea4b3c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88115da8a2797c5a09d954d49147e9fe3629747b834ddff8d56118177cea4b3c.exe
Resource
win10v2004-20220901-en
General
-
Target
88115da8a2797c5a09d954d49147e9fe3629747b834ddff8d56118177cea4b3c
-
Size
300KB
-
MD5
851c76cbf35945522c06fa2eadc6f4f5
-
SHA1
9f11b2117148eb7b9fcb56de3179e154475351eb
-
SHA256
88115da8a2797c5a09d954d49147e9fe3629747b834ddff8d56118177cea4b3c
-
SHA512
aa72c2680c42842e8e2d2a86ed39a53b217a57c8f4c85148d8d918b68be8ed778f989727c19905c9ff6bac715e6a3603e3e5c7cf656653ebdc4a510dbeab7289
-
SSDEEP
6144:D7m5RTEasezWAsZYgQNeanGnHNY9kkwjSz6YdBtwO2+ynTXSjrYQImYsRaTVrG3R:D7m5qasunqYgQgmGntY9ojy6YdsOjmbM
Malware Config
Signatures
Files
-
88115da8a2797c5a09d954d49147e9fe3629747b834ddff8d56118177cea4b3c.exe windows x86
2b9e73ff502840fe6b381682c42d43cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wpcap
install_bpf_program
pcap_compile
pcap_open_offline
pcap_create
pcap_open_live
bpf_validate
pcap_findalldevs
pcap_strerror
pcap_freealldevs
pcap_geterr
pcap_close
pcap_setfilter
pcap_stats
pcap_next_ex
ws2_32
gethostbyaddr
closesocket
WSASetLastError
getsockname
htonl
inet_addr
getservbyname
ntohl
inet_ntoa
ntohs
accept
htons
connect
WSAStartup
shutdown
WSACleanup
recv
bind
socket
send
listen
getservbyport
select
gethostbyname
getpeername
WSAGetLastError
pthreadvc
pthread_attr_init
pthread_attr_setdetachstate
pthread_exit
pthread_cancel
pthread_attr_destroy
pthread_setcancelstate
pthread_setcanceltype
pthread_create
packet
PacketSetMinToCopy
PacketSetLoopbackBehavior
kernel32
GetConsoleOutputCP
WriteConsoleA
HeapSize
FlushFileBuffers
SetStdHandle
CreateFileA
ReadFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSection
WriteConsoleW
RtlUnwind
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
GetStdHandle
WriteFile
HeapReAlloc
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapCreate
HeapDestroy
GetCurrentThreadId
SetLastError
TlsFree
GetSystemDirectoryA
FormatMessageA
GetLastError
FreeLibrary
GetProcAddress
CloseHandle
Sleep
LoadLibraryA
TlsSetValue
TlsAlloc
SetEndOfFile
SetConsoleCtrlHandler
HeapFree
HeapAlloc
GetModuleHandleA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetVersionExA
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
user32
MessageBoxA
advapi32
StartServiceCtrlDispatcherA
SetServiceStatus
LogonUserA
ImpersonateLoggedOnUser
RegisterServiceCtrlHandlerA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 496KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE