Static task
static1
Behavioral task
behavioral1
Sample
4abb39c9e496932cdd58bcbbdc6a92c86108acd3cabb281ce884f0ae81ce39ac.exe
Resource
win7-20220901-en
General
-
Target
4abb39c9e496932cdd58bcbbdc6a92c86108acd3cabb281ce884f0ae81ce39ac
-
Size
18KB
-
MD5
a1d3f9dfd74fed7381da9d13d9919a20
-
SHA1
d1c53cd60d1b97766a1da5f3346cb2f161da7ee5
-
SHA256
4abb39c9e496932cdd58bcbbdc6a92c86108acd3cabb281ce884f0ae81ce39ac
-
SHA512
970cae957e07a15cdc0e6355e532b3fd35d4bd0d8a58d08316b2347173ac78204d3ff8ddcf8104ea7f1c3f50a93b33b99b6a1430a6f71112611d5c5076613420
-
SSDEEP
384:pQ6rb8FucAMNMZPILvnw1fzdbal8IRXR6rYgsaEWq4Du8Oxerj:ph8ucp3vsbal8I/63suq4Ukj
Malware Config
Signatures
Files
-
4abb39c9e496932cdd58bcbbdc6a92c86108acd3cabb281ce884f0ae81ce39ac.exe windows x86
d8830768e26d5542e5a19dad95d6bbc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
ExitProcess
user32
FindWindowA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE