Static task
static1
Behavioral task
behavioral1
Sample
db6e8f5cf35f081e79bea79067222433217de9a73629614583284fa0b37c155e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db6e8f5cf35f081e79bea79067222433217de9a73629614583284fa0b37c155e.exe
Resource
win10v2004-20220901-en
General
-
Target
db6e8f5cf35f081e79bea79067222433217de9a73629614583284fa0b37c155e
-
Size
810KB
-
MD5
8441182feeeab8629ac2572f5504cdd1
-
SHA1
7df9376b52d17ffacb4fc0b65e8ade2b257e4ce2
-
SHA256
db6e8f5cf35f081e79bea79067222433217de9a73629614583284fa0b37c155e
-
SHA512
a0f624ce3dad733659427051756571bb8eb6a6243b327760ede3feb8e67710162d798bb29dcfbe602ebff0129141fac7a624f1fa15883e8c8180fbf83823a5a7
-
SSDEEP
24576:PUl5AMzRZU8KDRZEQw/ZGsqKJX5RB5AGKS/XPKa:PU33vLaO/ZtqKrKw/N
Malware Config
Signatures
Files
-
db6e8f5cf35f081e79bea79067222433217de9a73629614583284fa0b37c155e.exe windows x86
778daa5f0b96c409be75b1252ba75ddd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
GetLogicalDrives
GetLogicalDrives
SetCurrentDirectoryW
OpenMutexW
VirtualProtectEx
GetLogicalDrives
GetTickCount
GetFileAttributesA
GetModuleHandleW
CreateEventA
GetLogicalDriveStringsW
GetLogicalDrives
GetModuleHandleA
GetStringTypeA
lstrcpyW
riched20
RichEditANSIWndProc
IID_ITextHost
IID_IRichEditOle
RichEdit10ANSIWndProc
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_WRITE
.kdata Size: 801KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ