Static task
static1
Behavioral task
behavioral1
Sample
149d55d5db61d6fd75d0c015422f497bdd208bda276ef6ececa24da70f8e7c38.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
149d55d5db61d6fd75d0c015422f497bdd208bda276ef6ececa24da70f8e7c38.exe
Resource
win10v2004-20220901-en
General
-
Target
149d55d5db61d6fd75d0c015422f497bdd208bda276ef6ececa24da70f8e7c38
-
Size
320KB
-
MD5
838364ef2447cdb0e3cbeabba3e9dc00
-
SHA1
73717dd020953c44ddd3c5ee7b3481d3d54b53b0
-
SHA256
149d55d5db61d6fd75d0c015422f497bdd208bda276ef6ececa24da70f8e7c38
-
SHA512
9525133199219b6ee04f4a313fe2eb007c9e947baa7ad43d56f72513327cebd251013419f6fc02b3e19dddbf11337ed3589f66029400fbb8c57952128ba13602
-
SSDEEP
6144:HxbLZawbIjD0fsH2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:RBq462EB0NxDIBuOFe7/uT
Malware Config
Signatures
Files
-
149d55d5db61d6fd75d0c015422f497bdd208bda276ef6ececa24da70f8e7c38.exe windows x86
6ca17fffad8a1acd4838267641799780
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlCaptureStackBackTrace
EnumUILanguagesW
InitAtomTable
IsProcessorFeaturePresent
FlushFileBuffers
GetVersion
GetProcessHeaps
ReadConsoleOutputA
GetConsoleNlsMode
PrivCopyFileExW
SetMailslotInfo
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE