Behavioral task
behavioral1
Sample
05bf8a09f57f00959c35fc3786c98253.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
05bf8a09f57f00959c35fc3786c98253.exe
Resource
win10v2004-20220812-en
General
-
Target
05bf8a09f57f00959c35fc3786c98253.exe
-
Size
13KB
-
MD5
05bf8a09f57f00959c35fc3786c98253
-
SHA1
448b33865ca2c3ff90e66ce2ab95d8e058447e48
-
SHA256
6493f6d36fb844867be34f38d1ffa028c633c7c3c2434796342eff318f0d5683
-
SHA512
74653b63d1a8c66b1025612d5d1af57662577447ae3fa3a8f4c0a49836015d932f38ec055c51801f54b5037c2654a0cd0af232b9a6e5505e035ab47e98dbce99
-
SSDEEP
192:ucDfLAThZ1e7sf4QTbPk5+cput6tmyvmgN9Abytrrns+Tuy:hDkThZ0o4kbc5F0kfN9Airns+Ky
Malware Config
Extracted
systembc
onionnkfuzyzbu.xyz:4193
onionnkfuzyzbu2.xyz:4193
Signatures
-
Systembc family
Files
-
05bf8a09f57f00959c35fc3786c98253.exe.exe windows x86
e482b82a8d8801190972939fe54c538d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
RegisterClassA
LoadIconA
LoadCursorA
GetWindowThreadProcessId
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
GetMessageA
GetClassNameA
DispatchMessageA
CreateWindowExA
DefWindowProcA
GetWindowTextA
kernel32
LocalFree
SetEvent
SetFilePointer
OpenProcess
RemoveDirectoryA
GetTempPathA
WriteFile
WaitForSingleObject
VirtualFree
VirtualAlloc
SystemTimeToFileTime
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateThread
DeleteFileA
ExitProcess
FileTimeToSystemTime
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentVariableA
GetLocalTime
GetModuleHandleA
LocalAlloc
GetVolumeInformationA
Sleep
advapi32
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
wsock32
WSAStartup
closesocket
connect
htons
ioctlsocket
recv
select
send
setsockopt
shutdown
socket
WSACleanup
shell32
CommandLineToArgvW
ws2_32
freeaddrinfo
WSAIoctl
getaddrinfo
ole32
CoUninitialize
CoInitialize
CoCreateInstance
secur32
GetUserNameExA
GetUserNameExW
psapi
GetModuleFileNameExA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ