Static task
static1
Behavioral task
behavioral1
Sample
2f75484f3f48fec0965b650ce50bc4720eb4472ff6b12ec09adda22e4cb55f0d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2f75484f3f48fec0965b650ce50bc4720eb4472ff6b12ec09adda22e4cb55f0d.exe
Resource
win10v2004-20220812-en
General
-
Target
2f75484f3f48fec0965b650ce50bc4720eb4472ff6b12ec09adda22e4cb55f0d
-
Size
109KB
-
MD5
0c4ff78f1fc10fe190cb24b93f91b549
-
SHA1
11b38570adebc854c8556a00400e9ce026ebae2d
-
SHA256
2f75484f3f48fec0965b650ce50bc4720eb4472ff6b12ec09adda22e4cb55f0d
-
SHA512
4d77d357dfe92b26eb24f11c0276679d6aeee042b2eeea22be50f57ccbbe583b6abc03cf1b341c3db9f1b59dab4b250be703311a0c05f45d3e0c79f140bffde7
-
SSDEEP
3072:Q/+kaOA1i1F7CfTnfJwyExidyX8NF1OZuoT+yUT7PoV/:RB1i1qnf+jfOLQV+yUT7QV/
Malware Config
Signatures
Files
-
2f75484f3f48fec0965b650ce50bc4720eb4472ff6b12ec09adda22e4cb55f0d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
@0dU,: Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: - Virtual size: 356B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: 512B - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
@0dU,: Size: 451B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE