Static task
static1
Behavioral task
behavioral1
Sample
13423c6f63a3c02681a6fc83e7455220f5d805f323ae8b0d03dea8ca7c916504.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
13423c6f63a3c02681a6fc83e7455220f5d805f323ae8b0d03dea8ca7c916504.exe
Resource
win10v2004-20220812-en
General
-
Target
13423c6f63a3c02681a6fc83e7455220f5d805f323ae8b0d03dea8ca7c916504
-
Size
39KB
-
MD5
2ba1c61e6309ee0c270d6ed18aece2ee
-
SHA1
6a6bcc4896dba9c58638e58149348765b711eb69
-
SHA256
13423c6f63a3c02681a6fc83e7455220f5d805f323ae8b0d03dea8ca7c916504
-
SHA512
9a178c50e6f4519cee5ef0fec119abdb0eeb83e06f014f9d5723ef1bd4efdc2d8fe2991d63944a9a84ee1195260fd169e8648a089ec5470ec7b5a8243f5217e2
-
SSDEEP
768:Yvmq6affYFAfjhr8ypFeuZSlpbC6HlwFZLHBlCHjs17uZXVpxT:Zq6affYYl5BslI34HXVpx
Malware Config
Signatures
Files
-
13423c6f63a3c02681a6fc83e7455220f5d805f323ae8b0d03dea8ca7c916504.exe windows x86
880bb6799a6e1a5ff7b4f022ff4003a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_cexit
_XcptFilter
_exit
_c_exit
toupper
sprintf
sscanf
__set_app_type
fprintf
_setmode
_iob
time
exit
isdigit
isxdigit
islower
_except_handler3
__p__fmode
_controlfp
isspace
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
kernel32
GetModuleHandleA
GetLastError
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
FormatMessageA
LocalFree
snmpapi
SnmpUtilVarBindFree
SnmpUtilMemFree
SnmpUtilMemAlloc
SnmpUtilOidCpy
ws2_32
gethostbyname
inet_addr
ntohl
WSAStartup
iphlpapi
GetUdpStatsFromStackEx
GetTcpStatsFromStackEx
GetIpStatsFromStackEx
GetIcmpStatsFromStackEx
user32
CharToOemBuffA
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE