Behavioral task
behavioral1
Sample
1356-101-0x0000000000400000-0x0000000000552000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1356-101-0x0000000000400000-0x0000000000552000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1356-101-0x0000000000400000-0x0000000000552000-memory.dmp
-
Size
1.3MB
-
MD5
460f567da9b45d6976062548ed24c704
-
SHA1
87ea72df69c70a8acc874268aec782d3ec266722
-
SHA256
22e5a495c5b17786ab35c8ed74b53ea5511b4b41391d77eaf007985ff4f86473
-
SHA512
33c523b9379466b12add2dfd0edf04417fa5f2600a0ab663ab23d2756f4835a723f9fdfdfea29a251c28f80dcab9140a8f4ce7b240c051b56cf8d24403ff04b6
-
SSDEEP
24576:mckH+O5MMsj/8oJ0HOgwzMIdEyaXC772Q9NXw2/wPOjdGxY:mBHZ5MMpoJOp+MIVai7Tq24GjdGS
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
https://raroford3242.xyz/myupdate.exe
https://raroford3242.xyz/Sklmsstregens.vbs, https://raroford3242.xyz/remcexecrypt.exe, https://raroford3242.xyz/redlcryp.exe, https://raroford3242.xyz/racoocry.exe
https://raroford3242.xyz/myupdate.exe
https://raroford3242.xyz/myupdate.exe
Signatures
-
Eternity family
Files
-
1356-101-0x0000000000400000-0x0000000000552000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ