Behavioral task
behavioral1
Sample
2032-56-0x0000000000410000-0x000000000041B000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2032-56-0x0000000000410000-0x000000000041B000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2032-56-0x0000000000410000-0x000000000041B000-memory.dmp
-
Size
44KB
-
MD5
35bd5bccc08da6f458933a0b786b47c2
-
SHA1
fcdf37b557231bd43e9e2290458fdc52790a0d0e
-
SHA256
7dc0a4d40077a3a647a90bf8f1fdc28f00b7481024b004d943b1108f5a9fdc73
-
SHA512
be357325c989f41f987fd6dfa5fe628789b7288688573a051e0339f70a4c8f03c0c6f2b23dee679e64ba3d5972b054587d017b0d52251b9f4100ecc84cee8b19
-
SSDEEP
768:Hmvd6J8qSyafVyC+8nTV/C9FrdNyIoKoJoC1Kc6YJFg:ZJ8qSya4KNmJYIoKo2C1ps
Malware Config
Extracted
systembc
146.70.86.61:443
Signatures
-
Systembc family
Files
-
2032-56-0x0000000000410000-0x000000000041B000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ