Behavioral task
behavioral1
Sample
1760-73-0x0000000000400000-0x00000000014CD000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1760-73-0x0000000000400000-0x00000000014CD000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1760-73-0x0000000000400000-0x00000000014CD000-memory.dmp
-
Size
16.8MB
-
MD5
5cdc363a040e2ca15c5a0ef50642557b
-
SHA1
9df17f3967e8106c3af857e5a7b912c318dc09bc
-
SHA256
233c9a43e40962a374627cd69c28d2fb59a28397b7f80df3a2546289a883697f
-
SHA512
0de8560740a09e8b65f564a3ee1d7309dda246b15c115bc763f55b62e138c7733e10513929a6b81b66965626217ed1b1d6d6dc732df021a4fc32f1c6b742e8af
-
SSDEEP
12288:vga47jEnle/EQPlm0Nz70jNS9BQaZ5F9LOSfmiCG:Hnlf7iBnUSOq
Malware Config
Extracted
nymaim
45.139.105.171
85.31.46.167
Signatures
-
Nymaim family
Files
-
1760-73-0x0000000000400000-0x00000000014CD000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ