Static task
static1
Behavioral task
behavioral1
Sample
2a1ea68f4cb1bad1d4065ffc53d4d57b778ab8344b38c86b588f2c26d008d124.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2a1ea68f4cb1bad1d4065ffc53d4d57b778ab8344b38c86b588f2c26d008d124.exe
Resource
win10v2004-20220812-en
General
-
Target
2a1ea68f4cb1bad1d4065ffc53d4d57b778ab8344b38c86b588f2c26d008d124
-
Size
1.2MB
-
MD5
0a12840ff7acc020d5ecf969ae6608a8
-
SHA1
aa36dce1866d919214d4bf564c011f203161256d
-
SHA256
2a1ea68f4cb1bad1d4065ffc53d4d57b778ab8344b38c86b588f2c26d008d124
-
SHA512
16bdb54ea0fa97bb480060940e62db806cfb21d5d066ead0cf0e3eb632f9f1b56b60405c326ea0b470d1144eb540020b1a9c7fc02cd5d14bdc16adaf8cf53685
-
SSDEEP
24576:ys/TThvUgv/EDDWbqTBmg2NFNbS5UhHSdwLb9:f39UwElTBm1FJS5cHIwl
Malware Config
Signatures
Files
-
2a1ea68f4cb1bad1d4065ffc53d4d57b778ab8344b38c86b588f2c26d008d124.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 416KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
r3xn085e Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fwseyp27 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pua83epm Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
buzm7lf8 Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xa3s.j23 Size: 348KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE