Static task
static1
Behavioral task
behavioral1
Sample
ecda2e75bda5b1f6a12ddcca69d9e939171d09fa02b45576c2da4a6c71fffde9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ecda2e75bda5b1f6a12ddcca69d9e939171d09fa02b45576c2da4a6c71fffde9.exe
Resource
win10v2004-20220812-en
General
-
Target
ecda2e75bda5b1f6a12ddcca69d9e939171d09fa02b45576c2da4a6c71fffde9
-
Size
91KB
-
MD5
05f6b9f0411abfae02ed5190e29f067c
-
SHA1
c613559deecd9ca40786ec32c4e418d5dafca586
-
SHA256
ecda2e75bda5b1f6a12ddcca69d9e939171d09fa02b45576c2da4a6c71fffde9
-
SHA512
562aade5deecb01f1696ddb27694ae14da579750551ca5c7482055e07ef57bf4bf8e9f2afb02f71c369c55292f5cc39290c8b2dfd1e8eb8bbdeaf3250310a3e3
-
SSDEEP
1536:QReJbkwWLHfHO2hArQcbLTk3MsbQTUuKJFF7ys3SETmbN8O:weWtLHfHPAr/TkN8iJFFuE+N8O
Malware Config
Signatures
Files
-
ecda2e75bda5b1f6a12ddcca69d9e939171d09fa02b45576c2da4a6c71fffde9.exe windows x86
4faab5a30601fe4b0163346534e310d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetProcessDEPPolicy
GetTempFileNameW
FindFirstVolumeMountPointA
VirtualAllocEx
SetThreadContext
GetProfileSectionA
OpenFile
HeapUnlock
GetProcessIoCounters
GetDateFormatW
FindFirstVolumeA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 77KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE