Static task
static1
Behavioral task
behavioral1
Sample
shop-admin-hijacker.exe
Resource
win7-20220901-en
General
-
Target
0e17c4bedfe342244a4beee76e1d510701683b3d7326b4cf2bd8b4a38b735aad
-
Size
369KB
-
MD5
504a35e59ed7e4467777b195c5ebba6a
-
SHA1
e1cfeceebb7901de2b7926ee426e30db94bf1a21
-
SHA256
0e17c4bedfe342244a4beee76e1d510701683b3d7326b4cf2bd8b4a38b735aad
-
SHA512
a3b80edbdf1dab5333a6f505d15503e73d5eb62a8b9e0cf32658da7561196421858faf4f9cb50873bcfa19729f3dc3051b6639d14a4ea38c5be4a60f165b0563
-
SSDEEP
6144:yC30iEhXsKZ4BkWXCw3tumaNiaG0CvsU1am5LHngHf3sQ67evKpxwhPjySM/heK:x30xp4O6CCSiaEZAIngHf3s77eixuPjc
Malware Config
Signatures
Files
-
0e17c4bedfe342244a4beee76e1d510701683b3d7326b4cf2bd8b4a38b735aad.rar
-
shop-admin-hijacker.exe.exe windows x86
0271e503d8758a45b5105b59b4314ef0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord690
MethCallEngine
ord516
ord518
ord519
ord667
ord593
ord594
ord595
ord702
ord598
ord599
ord705
ord523
ord631
ord632
ord525
EVENT_SINK_AddRef
ord527
ord529
ord561
DllFunctionCall
EVENT_SINK_Release
ord601
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord606
ord530
ord531
ord717
ord533
ProcCallEngine
ord644
ord537
ord645
ord539
ord648
ord572
ord681
ord685
ord100
ord689
ord616
ord618
ord650
ord546
ord581
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ