Static task
static1
Behavioral task
behavioral1
Sample
6a6654b5219ad38195b61e8287d6aab356f0eca40d8e809d422d9075c66dde02.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6a6654b5219ad38195b61e8287d6aab356f0eca40d8e809d422d9075c66dde02.exe
Resource
win10v2004-20220812-en
General
-
Target
6a6654b5219ad38195b61e8287d6aab356f0eca40d8e809d422d9075c66dde02
-
Size
2.0MB
-
MD5
4fafff53eb3b2bffc2eecfdd47cd7a03
-
SHA1
8c46164f41e47a123a877590ca9d14e4dd48d5bd
-
SHA256
6a6654b5219ad38195b61e8287d6aab356f0eca40d8e809d422d9075c66dde02
-
SHA512
bc067942224c844aaabfa017a623c7dcf0b7ec4f55ff2f5f774b78466c1a93ca951b62930eb5ae49bfa8bd62534fd22f4edb44e8977b7c091c470732558b942a
-
SSDEEP
49152:dryR4nWLGC43UD41Lm79ePoyaSOT6vZFw8U:0RW+AWdgZG8U
Malware Config
Signatures
Files
-
6a6654b5219ad38195b61e8287d6aab356f0eca40d8e809d422d9075c66dde02.exe windows x86
46b0f98f491309108d771e05f4aad11c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
winmm
midiStreamOut
ws2_32
WSAAsyncSelect
kernel32
SetFilePointer
user32
GetDlgItem
gdi32
GetTextMetricsA
winspool.drv
OpenPrinterA
advapi32
RegCreateKeyExA
shell32
ShellExecuteA
ole32
CLSIDFromString
oleaut32
UnRegisterTypeLi
comctl32
ImageList_Destroy
wininet
InternetCanonicalizeUrlA
comdlg32
GetSaveFileNameA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 1020KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 992KB - Virtual size: 992KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ