Behavioral task
behavioral1
Sample
368-187-0x0000000000400000-0x00000000007E4000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
368-187-0x0000000000400000-0x00000000007E4000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
368-187-0x0000000000400000-0x00000000007E4000-memory.dmp
-
Size
3.9MB
-
MD5
a34a84434b64b0c22de62e22391f9a6d
-
SHA1
3e27efa2334280f1ef56aaef5f90a4b0a57c6bbc
-
SHA256
fd7246ba0297d1db2768d6162fd7a889332579392437306a31d5f87991105f78
-
SHA512
1a8a571ad16dcd0af9a6da0f25f65e9e7bb9bde24b927e2f921ba5349440f2306d7e5dd3036926e3d57a623ad8315cee9b6136c585574d929492eddf65bbdcfa
-
SSDEEP
98304:u77Pmq33rE/JDLPWZADUGer7B6iY74M/lmlwXVZ:w+R/eZADUXR
Malware Config
Extracted
bitrat
1.38
nicehash.at:6000
-
communication_password
005f16f264f006578c55237781f36898
-
install_dir
JavaHelper
-
install_file
Java.exe
-
tor_process
tor
Signatures
Files
-
368-187-0x0000000000400000-0x00000000007E4000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE