Static task
static1
Behavioral task
behavioral1
Sample
808143d8682e5f6f097679e4c26118ad3770c287e6e1525c36170ad7c6893a3c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
808143d8682e5f6f097679e4c26118ad3770c287e6e1525c36170ad7c6893a3c.exe
Resource
win10v2004-20220812-en
General
-
Target
808143d8682e5f6f097679e4c26118ad3770c287e6e1525c36170ad7c6893a3c
-
Size
228KB
-
MD5
0138c27a179bd294d1f2917b0eb8856c
-
SHA1
09d8dc14f92a1c4d5e08415f5b7ea3a26de2a127
-
SHA256
808143d8682e5f6f097679e4c26118ad3770c287e6e1525c36170ad7c6893a3c
-
SHA512
95e1c0cf3018f550282ec2066602163f0ffc6c18c948120f6ed1a9dc893a8c38b62f29a5150f8c0a0a28cc898cf71c295f008718a5acf8540f5aa74f0b41157d
-
SSDEEP
6144:RqPM2o8spr1SrJn984q0fIBS2jYD3YIhdO:ol5sFcx984LgBSCYDYIhd
Malware Config
Signatures
Files
-
808143d8682e5f6f097679e4c26118ad3770c287e6e1525c36170ad7c6893a3c.exe windows x86
67626a2885f6d0172a230abfe8fdcd50
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
getservbyport
select
__WSAFDIsSet
sendto
recvfrom
getsockname
getpeername
gethostname
htonl
ntohl
ntohs
ioctlsocket
setsockopt
bind
WSAGetLastError
listen
WSAAccept
shutdown
WSAStartup
WSASocketA
inet_addr
gethostbyname
connect
send
recv
closesocket
WSACleanup
htons
advapi32
CreateServiceA
StartServiceA
RegisterServiceCtrlHandlerA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
SetServiceStatus
StartServiceCtrlDispatcherA
odbc32
ord11
ord24
ord75
ord39
ord7
ord31
ord9
kernel32
GetStringTypeW
GetStringTypeA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
WriteConsoleW
GetConsoleOutputCP
CreateFileA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetLocaleInfoA
HeapSize
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
WriteConsoleA
GetModuleHandleA
LCMapStringW
LCMapStringA
FlushFileBuffers
ReadFile
MultiByteToWideChar
Sleep
CloseHandle
LeaveCriticalSection
EnterCriticalSection
FreeConsole
GetCurrentProcessId
GetProcAddress
GetLastError
LoadLibraryA
GetFullPathNameA
GetModuleFileNameA
GetWindowsDirectoryA
InitializeCriticalSection
GetVersionExA
DeleteCriticalSection
GetCurrentThreadId
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
ExitThread
CreateThread
HeapFree
ExitProcess
DeleteFileA
GetTimeZoneInformation
GetCommandLineA
GetProcessHeap
GetCurrentDirectoryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
RtlUnwind
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetStdHandle
WriteFile
GetConsoleCP
GetConsoleMode
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetFileAttributesA
GetCPInfo
GetACP
GetOEMCP
Sections
.text Size: 180KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE