Behavioral task
behavioral1
Sample
1048-57-0x0000000000400000-0x0000000000886000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1048-57-0x0000000000400000-0x0000000000886000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1048-57-0x0000000000400000-0x0000000000886000-memory.dmp
-
Size
4.5MB
-
MD5
06d3d60d09a36608ad5572534644fb48
-
SHA1
67d7b6b048dbc54b8e9ffe2a5c163da00ff61422
-
SHA256
ec1b03e5dfb85d518950fed3b35868716d7157ac214bd08067a131fa7d494775
-
SHA512
ce3372655e95ec57b1f1fd9e24b520bc781ab8995b767ac9d30ef310a8104ef0ed2f8562ab77913ba78690bbe46a4b7ea0b0feefc11c340472ecc3c691e8eff4
-
SSDEEP
98304:70MisqYI8hoFgWMzT5HL15qY3NozzRPeoDftf:VPlI+oYzNR5nNUzRPD
Malware Config
Extracted
systembc
slavelever.info:4248
slavelevereoewl.info:4248
Signatures
-
Systembc family
Files
-
1048-57-0x0000000000400000-0x0000000000886000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 5KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
����坖 Size: 70.3MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qztjppht Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
owglwbdi Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE