Static task
static1
Behavioral task
behavioral1
Sample
8bc3f61619f92e681d9c16292c1afdfa37c431269ec84459f934117be4a6fb18.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8bc3f61619f92e681d9c16292c1afdfa37c431269ec84459f934117be4a6fb18.exe
Resource
win10v2004-20220812-en
General
-
Target
8bc3f61619f92e681d9c16292c1afdfa37c431269ec84459f934117be4a6fb18
-
Size
72KB
-
MD5
0ec64e0eea97874432958d51ad774b48
-
SHA1
e06cc1b066fc9cafd11416b40422ebe7ed875372
-
SHA256
8bc3f61619f92e681d9c16292c1afdfa37c431269ec84459f934117be4a6fb18
-
SHA512
c0a5b704ea11086b02af89089e95eb06122687844921aba8a137732023e56c6b9474c149045cc19b6435b16674a19af96eeb87031aa076fbc7454032842a1f4a
-
SSDEEP
768:TX5QSCddbf2QOGUTDMVPcQFZUdvbQ/fM5dX+9N+axxthhhhhhZzWNou0zllkJRP1:TX5jLGUPMWLpbQ/UTO7xTzq0rkDyry
Malware Config
Signatures
Files
-
8bc3f61619f92e681d9c16292c1afdfa37c431269ec84459f934117be4a6fb18.exe windows x86
c696ae699d135c594cf29a24a66170e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetDriveTypeA
TlsGetValue
LoadLibraryW
IsBadStringPtrW
InitializeCriticalSection
WriteFile
HeapCreate
GetEnvironmentVariableW
ReleaseMutex
lstrlenW
CreateEventW
ReleaseMutex
GetPrivateProfileStringA
GetFileTime
FindClose
GlobalFlags
FindAtomA
LocalFree
GetCurrentProcessId
user32
GetClassInfoA
DrawStateW
CreateWindowExA
GetClientRect
GetSysColor
GetSysColor
SetFocus
GetKeyboardType
IsWindow
EndDialog
DrawTextA
CallWindowProcW
DispatchMessageA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE