Static task
static1
Behavioral task
behavioral1
Sample
52e598fd04e4347ed61d04a55d17b30d3662c2ca09dbe46687fadcf71f1f24e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
52e598fd04e4347ed61d04a55d17b30d3662c2ca09dbe46687fadcf71f1f24e2.exe
Resource
win10v2004-20220901-en
General
-
Target
52e598fd04e4347ed61d04a55d17b30d3662c2ca09dbe46687fadcf71f1f24e2
-
Size
56KB
-
MD5
0918ec4dfad70a0bbe9c557fe87feeb7
-
SHA1
3d17fb7e3994be1613e71d039d26282eca4a9217
-
SHA256
52e598fd04e4347ed61d04a55d17b30d3662c2ca09dbe46687fadcf71f1f24e2
-
SHA512
8c55e9f4a202c63d6cae04de3869dacc79c28dbc6a871b3af8fa4fd3ea0636d0475000679af6848603c8fb2c0a673731aa837564189974a9660196a47894d33d
-
SSDEEP
768:v9zbUm2+ZvEbn6L5HE2Yk65Ovl4U5Si7zxbJqKkkhUw23S1CPxPgTz5q35Fv2yiD:Pvl5fv4O7z9JqKvKPxPe8ayGVghK1
Malware Config
Signatures
Files
-
52e598fd04e4347ed61d04a55d17b30d3662c2ca09dbe46687fadcf71f1f24e2.exe windows x86
f59cbda55cec56847db167db5fc34aca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ZombifyActCtx
GetVolumeNameForVolumeMountPointW
AssignProcessToJobObject
VirtualFree
SetConsoleMode
GetConsoleTitleW
HeapUsage
Module32FirstW
WaitNamedPipeA
HeapUsage
VirtualLock
CreateProcessInternalW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE