Behavioral task
behavioral1
Sample
432-57-0x0000000000400000-0x000000000089A000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
432-57-0x0000000000400000-0x000000000089A000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
432-57-0x0000000000400000-0x000000000089A000-memory.dmp
-
Size
4.6MB
-
MD5
b71d1178ec6aa6654fc5c156ccb62f21
-
SHA1
9a121de7568fc2741eda3970bb8128da6dd2ec6b
-
SHA256
86fbd75b3b9db6b7e7e73f4d65d3a83be676684a6681c7e1bbd508748696db21
-
SHA512
4ddf5eed2401c1d1ab5a0a660474a977eeb4a36e26acb08b21b20a8a39c07b136e4593648b8bd53304f9ec9caa2941e1c7d5c99aab2a38525c126ad1f3e3dba7
-
SSDEEP
98304:h9u0YGA+RM6knRNbQ18ABGZLnv5FeV4/XOYfAz:7uPyD2NQOAsZLvzeWX
Malware Config
Extracted
systembc
slavelever.info:4248
slavelevereoewl.info:4248
Signatures
-
Systembc family
Files
-
432-57-0x0000000000400000-0x000000000089A000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 5KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Д��嬞 Size: 3205.0MB - Virtual size: 4096.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hytductb Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mpecmrcr Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE