Static task
static1
Behavioral task
behavioral1
Sample
49a48d06d1de9a0810776f7303466ff53a2e9baec59a7ad43241218228068670.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49a48d06d1de9a0810776f7303466ff53a2e9baec59a7ad43241218228068670.exe
Resource
win10v2004-20220812-en
General
-
Target
49a48d06d1de9a0810776f7303466ff53a2e9baec59a7ad43241218228068670
-
Size
320KB
-
MD5
01077a101e7e80641465bdc2aacc3130
-
SHA1
59d94c737bff872d9ad70dd3861f42bc8dca4ada
-
SHA256
49a48d06d1de9a0810776f7303466ff53a2e9baec59a7ad43241218228068670
-
SHA512
c1a5a9df4734518737a250a36948f7ab3f00f3444d39171f85fd5eb88da6c92f3856889d71f036995cd954453321b5ea72bc5e326d0e6adb1f0bc96b150326ef
-
SSDEEP
6144:bSfFEC6sN1uH2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:mFH/N1U2EB0NxDIBuOFe7/uT
Malware Config
Signatures
Files
-
49a48d06d1de9a0810776f7303466ff53a2e9baec59a7ad43241218228068670.exe windows x86
fbc0a649ba7fa481257a62e566703886
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetProcessWorkingSetSize
RtlZeroMemory
GetExitCodeProcess
HeapUnlock
SetComputerNameW
SetConsoleActiveScreenBuffer
_lopen
ExitVDM
SetConsoleNlsMode
EnumSystemCodePagesW
SetConsoleCursor
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE