Static task
static1
Behavioral task
behavioral1
Sample
6f1b569c6c3f9c5edcdd97d94194c2874bca7e36106272fbaf2217574110f89e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f1b569c6c3f9c5edcdd97d94194c2874bca7e36106272fbaf2217574110f89e.exe
Resource
win10v2004-20220812-en
General
-
Target
6f1b569c6c3f9c5edcdd97d94194c2874bca7e36106272fbaf2217574110f89e
-
Size
61KB
-
MD5
048961f57adbdddc83739d01dffc54c7
-
SHA1
36dbbd78ba5b391e0d5b879ae0d3368d8cdcfffc
-
SHA256
6f1b569c6c3f9c5edcdd97d94194c2874bca7e36106272fbaf2217574110f89e
-
SHA512
0762e655226d4ca463cfd5d8644761911246d8c91c95405bf80ea94179d708427f67f9faa3629eea2d47cd1ae8ece490e8202ce325a00986ec8911fd5548e35f
-
SSDEEP
1536:XWrUHB/VEhjwUsSWj7ZRRQEj5Gq/2RWZIYmO9c80uiLS7vO:XdHBNEnWj7WEA3oSYmO9Eunm
Malware Config
Signatures
Files
-
6f1b569c6c3f9c5edcdd97d94194c2874bca7e36106272fbaf2217574110f89e.exe windows x86
868018fe7c31ad33e413ee3aca895671
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetComputerNameExA
RemoveDirectoryA
GetProcessVersion
UnlockFile
FoldStringW
GetConsoleAliasesLengthW
SetEvent
CreateProcessInternalW
UnlockFileEx
Toolhelp32ReadProcessMemory
GetConsoleCursorMode
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE