Static task
static1
Behavioral task
behavioral1
Sample
dbc494db40528e82172b0a5a5c84f6407e9fb59afc4d84207b603bc01e92ed09.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dbc494db40528e82172b0a5a5c84f6407e9fb59afc4d84207b603bc01e92ed09.exe
Resource
win10v2004-20220812-en
General
-
Target
dbc494db40528e82172b0a5a5c84f6407e9fb59afc4d84207b603bc01e92ed09
-
Size
119KB
-
MD5
31761ead36584a3ca7598d74d19c770c
-
SHA1
b24451012395dc5598df6b81904218158c8abe9f
-
SHA256
dbc494db40528e82172b0a5a5c84f6407e9fb59afc4d84207b603bc01e92ed09
-
SHA512
307eedaceef82d29206d20c38defdf9f2a0e076cf39e2710b8a1fc4c570220d51e2f75464393394716013b7b617cacaef53433093a03bc25fa261658193a05a6
-
SSDEEP
1536:oQFBli/CtoLzoL8/NZn0IdDn1FK3pphpPAPpjVrs2ryrd1vUQuqSSqK5tnCvv:oQFBI/KoLzM2fPDn1FKDhBAPHs2qxnC
Malware Config
Signatures
Files
-
dbc494db40528e82172b0a5a5c84f6407e9fb59afc4d84207b603bc01e92ed09.exe windows x86
46ad2ca5c25cbf6537980bef3a8e0afc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
SetMailslotInfo
GetConsoleCommandHistoryW
OpenMutexW
GetStringTypeW
GetConsoleCursorMode
ConvertDefaultLocale
CreateProcessInternalW
CreateActCtxA
SwitchToThread
GetVolumePathNameA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 63KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE