Static task
static1
Behavioral task
behavioral1
Sample
8d8b74bc25e006faa6becbad5b6c4825506afbdc3196aefe852f73b83a152e3c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d8b74bc25e006faa6becbad5b6c4825506afbdc3196aefe852f73b83a152e3c.exe
Resource
win10v2004-20220812-en
General
-
Target
8d8b74bc25e006faa6becbad5b6c4825506afbdc3196aefe852f73b83a152e3c
-
Size
30KB
-
MD5
93b459f863bb74287b3859599a1b24a0
-
SHA1
9780338e0c18fc5f7abb6e2b32d4ad0226b4e911
-
SHA256
8d8b74bc25e006faa6becbad5b6c4825506afbdc3196aefe852f73b83a152e3c
-
SHA512
3ead118bbd4d485c0d197576b5293e5d0d65802e18a5a0c6eaa3d0bdedb27bcde59edb90096a95ea226cb6dc41d70c39bf65efb6408e328fbe366e2c27dbca61
-
SSDEEP
768:9/XxOdCBKpwqUqniMgCF+/zz22DylnW4PS1:9/XxOdvqqniMv+mFnA
Malware Config
Signatures
Files
-
8d8b74bc25e006faa6becbad5b6c4825506afbdc3196aefe852f73b83a152e3c.exe windows x86
89a5d8e0e580600b508644fc40da7b52
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAStartup
connect
gethostbyaddr
gethostbyname
htons
inet_addr
recv
send
socket
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
shell32
ShellExecuteA
kernel32
GetCommandLineA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetSystemDirectoryA
CloseHandle
GetTickCount
HeapAlloc
HeapFree
CopyFileA
OpenMutexA
CreateDirectoryA
ReadFile
RtlUnwind
RtlZeroMemory
CreateFileA
SetFilePointer
Sleep
WriteFile
CreateMutexA
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
user32
wsprintfA
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
exit
memset
raise
rand
signal
srand
strchr
strstr
strtok
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE