Static task
static1
Behavioral task
behavioral1
Sample
c4a0c68ea728253aa2d137394ff8652edae4c39e9a0d542616259786838af88f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c4a0c68ea728253aa2d137394ff8652edae4c39e9a0d542616259786838af88f.exe
Resource
win10v2004-20221111-en
General
-
Target
c4a0c68ea728253aa2d137394ff8652edae4c39e9a0d542616259786838af88f
-
Size
226KB
-
MD5
5185cc58714ac2cc06428fab5efedd4a
-
SHA1
2c6c968a71f0e17c4e75fa3b6347792d61b499dd
-
SHA256
c4a0c68ea728253aa2d137394ff8652edae4c39e9a0d542616259786838af88f
-
SHA512
f56270b8f79eb1d671b42b4ca7169f666e4ac6776f70a2e04400e603bbb59b2f58cf552175fd2128268e5197a3f931835ff11a6fb62e39d09838d386fda6117f
-
SSDEEP
6144:nMtnWD6perSjj/dqTW7NpYR23RtW94nY5BvBUwIkdhAGhDjUU:MtWD0ergdc4YkD7Y58wIkAGdUU
Malware Config
Signatures
Files
-
c4a0c68ea728253aa2d137394ff8652edae4c39e9a0d542616259786838af88f.exe windows x86
59a07cb97fe3c54b7d16984e0eb0b47b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostname
__WSAFDIsSet
WSAStartup
listen
accept
getpeername
bind
getsockname
inet_ntoa
recv
htonl
sendto
inet_addr
send
select
closesocket
ntohs
socket
gethostbyname
htons
connect
setsockopt
WSACleanup
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
mfc42
ord823
msvcrt
__set_app_type
__p__fmode
_strupr
_adjust_fdiv
__setusermatherr
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_controlfp
_initterm
calloc
__p__commode
_except_handler3
memcpy
__CxxFrameHandler
_CxxThrowException
memmove
_ftol
strlen
memset
memcmp
rand
strstr
strcpy
sprintf
strncpy
free
malloc
strncat
strrchr
strcmp
rename
strcat
_iob
atoi
_errno
strtok
vsprintf
realloc
atol
_mbsstr
_mbscmp
strncmp
wcscpy
mbstowcs
_beginthreadex
??1type_info@@UAE@XZ
kernel32
lstrlenA
GetProcAddress
GetStartupInfoA
GetModuleHandleA
LoadLibraryA
user32
LoadCursorA
GetWindowTextA
Sections
.text Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ