Static task
static1
Behavioral task
behavioral1
Sample
fb57d573d9ee4b985fc568c82def8d47019ce7c59c21efd32f950aacaff10c38.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fb57d573d9ee4b985fc568c82def8d47019ce7c59c21efd32f950aacaff10c38.exe
Resource
win10v2004-20221111-en
General
-
Target
fb57d573d9ee4b985fc568c82def8d47019ce7c59c21efd32f950aacaff10c38
-
Size
812KB
-
MD5
16cb69e00a31a86b673b97ce8f794177
-
SHA1
a0ce3ad22b3465a6ff22d600053b136273c09dea
-
SHA256
fb57d573d9ee4b985fc568c82def8d47019ce7c59c21efd32f950aacaff10c38
-
SHA512
1f5e763e0463ffa10ed88df75d75cb6b6e3e1825850bdde07a24c1aa6c5cd9c3712050b1fb7648d57a563bbeffbe6362ee26286bcad5894df1c05df3468ed22f
-
SSDEEP
24576:5hyX0uJwbfa6CnMD1wE900XpvDHeS1TyqaUX7cKNs:5kXwbS5n4wE90057HB4NU
Malware Config
Signatures
Files
-
fb57d573d9ee4b985fc568c82def8d47019ce7c59c21efd32f950aacaff10c38.exe windows x86
185e74e6c9ad60a377f0f5030bd37b31
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GetStringTypeA
GetConsoleTitleA
GetCurrentProcess
GetTickCount
CreateMutexW
LoadLibraryA
DeleteFileA
lstrcpyW
SetVolumeLabelA
SetStdHandle
SetEnvironmentVariableA
EnterCriticalSection
GetProcessVersion
HeapCreate
OpenThread
SetCurrentDirectoryA
FoldStringA
GetPrivateProfileIntW
aaclient
OpenKeyReaderWriter
LoadClientAdapter
OpenKeyReader
g_fnStartTransport
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gdata Size: 1024B - Virtual size: 718B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jdata Size: 800KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ