Static task
static1
Behavioral task
behavioral1
Sample
e8e93a63c6e3c7fed50d616d9b5fc3781589c79efbdee469cf8cc446560727ec.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e8e93a63c6e3c7fed50d616d9b5fc3781589c79efbdee469cf8cc446560727ec.exe
Resource
win10v2004-20221111-en
General
-
Target
e8e93a63c6e3c7fed50d616d9b5fc3781589c79efbdee469cf8cc446560727ec
-
Size
144KB
-
MD5
3d82109c3728043eb748e74173a727d0
-
SHA1
553cbdb368e7824a0fd2d05eb13312a246f7d9a2
-
SHA256
e8e93a63c6e3c7fed50d616d9b5fc3781589c79efbdee469cf8cc446560727ec
-
SHA512
ee5f6eb2d022c801a3aac9986e54372d5bfe753f7b21d4716a542a5ecd689f4b363fb537d00ff8f4de72888f81aedd01d176b42a9120b7204cfdc6191fab581e
-
SSDEEP
3072:AGMohJ718OEiNBP718rBrBQyizKgtFJlsmiE:LhJ58OdV7CFiyiWC6miE
Malware Config
Signatures
Files
-
e8e93a63c6e3c7fed50d616d9b5fc3781589c79efbdee469cf8cc446560727ec.exe windows x86
adf801abd4677429ccec4447083cae59
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
GetLastError
GetModuleHandleA
GetProcAddress
CloseHandle
GetTempPathA
GetTickCount
RtlUnwind
SetLastError
GetCommandLineA
GetStdHandle
MultiByteToWideChar
GetFileType
LoadLibraryA
FreeLibrary
LocalFree
FindFirstFileA
LocalAlloc
WriteConsoleA
FormatMessageA
FindNextFileA
GetFileAttributesA
VerifyVersionInfoW
crtdll
__GetMainArgs
exit
raise
signal
ntdll
VerSetConditionMask
wcsncpy
wcschr
wcslen
memmove
_wcslwr
wcscmp
wcscpy
_wcsnicmp
wcscat
_ultoa
wcstoul
wcstol
user32
LoadStringA
winsta
WinStationOpenServerW
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 129KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 434B - Virtual size: 434B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ