Static task
static1
Behavioral task
behavioral1
Sample
aleksey_bolshoy_tfile_ru.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aleksey_bolshoy_tfile_ru.exe
Resource
win10v2004-20221111-en
General
-
Target
2174e9a7cf1626bc855877f820ae070e5645cc56f0e70671b33dd4fab3d83d24
-
Size
363KB
-
MD5
eff5f3d47aca27a3f4235e428cd9cbcf
-
SHA1
add213222213e1a0a48f7da45135665398032e43
-
SHA256
2174e9a7cf1626bc855877f820ae070e5645cc56f0e70671b33dd4fab3d83d24
-
SHA512
065476d0c382351a4dbd6aac62fdad3734e625f690305b1d6dc8bbf5be87c445b653bbdfc5c9e71abb5d41ff55ab93e238ed8095682ac868f6cf8fd7dd85e0b9
-
SSDEEP
6144:u+A70TSKev3OeiMlvnf1h5JJ6PP7ztVAZzeq/pai7yxovxKpTL5rK/8gRy9StHC+:SAGKevB7vfoPbAZZ/8COsxi5r4w9StHf
Malware Config
Signatures
Files
-
2174e9a7cf1626bc855877f820ae070e5645cc56f0e70671b33dd4fab3d83d24.zip
-
aleksey_bolshoy_tfile_ru.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 432KB - Virtual size: 431KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ