Static task
static1
Behavioral task
behavioral1
Sample
f6e334a9afe043e25206f3fc933e45b01114f6c1d305d11842dff422f9157380.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6e334a9afe043e25206f3fc933e45b01114f6c1d305d11842dff422f9157380.exe
Resource
win10v2004-20220901-en
General
-
Target
f6e334a9afe043e25206f3fc933e45b01114f6c1d305d11842dff422f9157380
-
Size
443KB
-
MD5
81def23b65fd500909519a0e799c4fe0
-
SHA1
75c1080ece5ac356a46094604e4034bad46a3c89
-
SHA256
f6e334a9afe043e25206f3fc933e45b01114f6c1d305d11842dff422f9157380
-
SHA512
369ec15f61abd23843b52168b6a3d4a26737dc8e7bca0282ed2af01b534ad38f00643256071c3538b8788a3b23ec27093c98d6f922561556e101e7c04166235a
-
SSDEEP
12288:phhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh1:nedvzLpxXPm2+xg89pjCXyp
Malware Config
Signatures
Files
-
f6e334a9afe043e25206f3fc933e45b01114f6c1d305d11842dff422f9157380.exe windows x86
aea31acbb1880837658474a76938a2d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtCompareTokens
NtReleaseMutant
ole32
HBITMAP_UserMarshal
user32
PeekMessageW
GetOpenClipboardWindow
GetClipboardViewer
kernel32
GetCommandLineW
Sections
.text Size: 436KB - Virtual size: 436KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 161B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE