Behavioral task
behavioral1
Sample
1456-56-0x0000000000400000-0x00000000011AE000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1456-56-0x0000000000400000-0x00000000011AE000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1456-56-0x0000000000400000-0x00000000011AE000-memory.dmp
-
Size
13.7MB
-
MD5
db9ff838bb2c50c33a00c8ab633098d3
-
SHA1
f8a29bbc75b2f2134eb3507eedca3a2d5ecaa739
-
SHA256
51640a5356384f27bd360069281a78c7da9890bd14c2b938ca291f0cdbf030d7
-
SHA512
75141ad9bc22447731e8b1cba5e85fbfe0a7218d7232339613b2eaf34eea9d663efb99b755cdd15da89e97af13e01da2cb7c941ab76ee42b49085d7bc9eabaab
-
SSDEEP
98304:pVV48ig0clW7XYD/7CD8l1jlpvtyd45GYd/syb76mBnOd2MPX:DV48igaAeivty25BSUemxOd2wX
Malware Config
Signatures
-
Privateloader family
Files
-
1456-56-0x0000000000400000-0x00000000011AE000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: - Virtual size: 7.7MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.6MB - Virtual size: 5.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 94KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE