Static task
static1
Behavioral task
behavioral1
Sample
eeb00122befc84c7cfc1c8f2f3576b5a3d2dda33769495083752bc252cf1cb5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eeb00122befc84c7cfc1c8f2f3576b5a3d2dda33769495083752bc252cf1cb5f.exe
Resource
win10v2004-20220901-en
General
-
Target
eeb00122befc84c7cfc1c8f2f3576b5a3d2dda33769495083752bc252cf1cb5f
-
Size
64KB
-
MD5
3f43831cd3a867501a613e3c44224a8e
-
SHA1
b11df09621930b674acc55681db0d9977a1c899b
-
SHA256
eeb00122befc84c7cfc1c8f2f3576b5a3d2dda33769495083752bc252cf1cb5f
-
SHA512
f63e0eecf112c2b0b5c77f6f7fb09c7df9f572118b366ada834691821b7fbcd92801d13f9a13671906475e1ada8ea54a81113bf098b4f6f8f6ed7e4543f88e41
-
SSDEEP
768:rxHaspe/GiMx4FDwehxLuZ58MXjc13d3NPh:rxHtqM6FDVhJu2t
Malware Config
Signatures
Files
-
eeb00122befc84c7cfc1c8f2f3576b5a3d2dda33769495083752bc252cf1cb5f.exe windows x86
362f81fae58a4766caadfd5656eec3f5
Headers
Imports
wininet
InternetCloseHandle
InternetGetConnectedState
InternetOpenA
InternetOpenUrlA
InternetReadFile
shell32
ShellExecuteA
kernel32
DeleteFileA
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
GetCommandLineA
GetFileAttributesA
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryA
CloseHandle
GetTempPathA
GetTickCount
GetVersionExA
CopyFileA
ReadFile
ReleaseMutex
RtlUnwind
RtlZeroMemory
CreateFileA
SetFilePointer
Sleep
TerminateThread
WinExec
WriteFile
CreateMutexA
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
user32
wsprintfA
CharUpperBuffA
advapi32
GetUserNameA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ws2_32
WSACleanup
listen
ioctlsocket
inet_addr
htons
getsockname
socket
gethostbyname
gethostbyaddr
connect
closesocket
bind
accept
WSAStartup
send
select
WSAGetLastError
recv
crtdll
__GetMainArgs
_snprintf
_splitpath
atoi
exit
free
malloc
memset
raise
rand
signal
sprintf
srand
strcat
strchr
strcmp
strncpy
strpbrk
strstr
strtok
Sections
pec1 Size: 60KB - Virtual size: 60KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE