Static task
static1
Behavioral task
behavioral1
Sample
6bf78c5af4485f7481ef1b0bf3c1322dabc7f1a6e1dfde294866fdd36a0517cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6bf78c5af4485f7481ef1b0bf3c1322dabc7f1a6e1dfde294866fdd36a0517cc.exe
Resource
win10v2004-20220812-en
General
-
Target
6bf78c5af4485f7481ef1b0bf3c1322dabc7f1a6e1dfde294866fdd36a0517cc
-
Size
30KB
-
MD5
84ccba3f94a6992eb153f905c50e6ff0
-
SHA1
24a76d479338ab4de1d98a3884244aff3d01d11a
-
SHA256
6bf78c5af4485f7481ef1b0bf3c1322dabc7f1a6e1dfde294866fdd36a0517cc
-
SHA512
61fdd3df9674ad50374d6855ac15126dafa310a24ee56d6d92a2bc7f7654cd5a81de74a8989cdcac7ef819d92a82d649018c4994dd4bcd68849ecc28c45003c5
-
SSDEEP
768:H/XxOdCBKpwqUqniMgCF+/zz22DylnW4PS1:H/XxOdvqqniMv+mFnA
Malware Config
Signatures
Files
-
6bf78c5af4485f7481ef1b0bf3c1322dabc7f1a6e1dfde294866fdd36a0517cc.exe windows x86
89a5d8e0e580600b508644fc40da7b52
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAStartup
connect
gethostbyaddr
gethostbyname
htons
inet_addr
recv
send
socket
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
shell32
ShellExecuteA
kernel32
GetCommandLineA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetSystemDirectoryA
CloseHandle
GetTickCount
HeapAlloc
HeapFree
CopyFileA
OpenMutexA
CreateDirectoryA
ReadFile
RtlUnwind
RtlZeroMemory
CreateFileA
SetFilePointer
Sleep
WriteFile
CreateMutexA
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
user32
wsprintfA
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
exit
memset
raise
rand
signal
srand
strchr
strstr
strtok
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE