Static task
static1
Behavioral task
behavioral1
Sample
411de63b612351ac054d0fa225c94d0400f850c75b149beb93d4a8db29192bd0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
411de63b612351ac054d0fa225c94d0400f850c75b149beb93d4a8db29192bd0.exe
Resource
win10v2004-20220812-en
General
-
Target
411de63b612351ac054d0fa225c94d0400f850c75b149beb93d4a8db29192bd0
-
Size
59KB
-
MD5
f57b890436bed61e6e8fc5c0dd6f79ad
-
SHA1
3640d24053c0c06c4a35c9b52f5591ca70aa1dd5
-
SHA256
411de63b612351ac054d0fa225c94d0400f850c75b149beb93d4a8db29192bd0
-
SHA512
f7adceefde8bd5951758b1c463a9bb237498c39ff247d390a1a0c910aa09e5aab4a466a1c21065c441a8407d18ae8572273df748f98139c2f92ed4bd9963199b
-
SSDEEP
1536:RLxLKKyuNSly6g5j5jec/amMmsmhP6Z/gC3ew:RLBKISly6gfImZNhM0
Malware Config
Signatures
Files
-
411de63b612351ac054d0fa225c94d0400f850c75b149beb93d4a8db29192bd0.exe windows x86
220c26345d989b37475ae71cbeed6454
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumePathNameA
FileTimeToLocalFileTime
GetLogicalDriveStringsA
SuspendThread
CreateMailslotA
lstrcmpiA
lstrcmpiA
GetModuleHandleA
lstrcmpiA
HeapCreate
WaitForSingleObject
GetProcessHeap
GetDriveTypeW
lstrlenA
lstrcmpiA
SetLastError
GetStdHandle
Sleep
DeleteFileA
GetModuleFileNameA
CreateNamedPipeA
IsValidLocale
lstrcmpiA
riched20
RichEditANSIWndProc
CreateTextServices
IID_ITextHost
IID_IRichEditOle
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.adata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sql Size: 1024B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ