Static task
static1
Behavioral task
behavioral1
Sample
eac42f4009e1f14549f4cbc555a94d51afaff2614335e8b2bfd8c7ec7eafd112.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eac42f4009e1f14549f4cbc555a94d51afaff2614335e8b2bfd8c7ec7eafd112.exe
Resource
win10v2004-20220812-en
General
-
Target
eac42f4009e1f14549f4cbc555a94d51afaff2614335e8b2bfd8c7ec7eafd112
-
Size
62KB
-
MD5
51e386fcc54ba45127bb6015279693f0
-
SHA1
97cbbc2f04901f190c6066e185ff35ac1b3d5836
-
SHA256
eac42f4009e1f14549f4cbc555a94d51afaff2614335e8b2bfd8c7ec7eafd112
-
SHA512
72f400023b4ed8b797f4f073164925b49d2e1162f75d2ab19efe0e8d2baa0fb694da9ae0d71a1de8ae0dd67bbbe4721923b95fc2adaf6340e55226743f1b1562
-
SSDEEP
1536:pP38Ow/M35nUV7SqiPilc8TroqIuzdJw/OtL/wpuHvd64qRKDDfm:5sOwU35nUV75iYc8T6uzHlLNkqm
Malware Config
Signatures
Files
-
eac42f4009e1f14549f4cbc555a94d51afaff2614335e8b2bfd8c7ec7eafd112.exe windows x86
9048dee423fe84947bd22dd300c54e7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObjectEx
FindNextVolumeMountPointW
OpenWaitableTimerW
FlushFileBuffers
SetFilePointer
SetConsoleActiveScreenBuffer
CmdBatNotification
GetProcessWorkingSetSize
UnregisterWait
GetFileAttributesExA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 47KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE