Static task
static1
Behavioral task
behavioral1
Sample
d773f0e07de0627425a59add65316b618389662f9a5702df461f191d64327f98.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d773f0e07de0627425a59add65316b618389662f9a5702df461f191d64327f98.exe
Resource
win10v2004-20221111-en
General
-
Target
d773f0e07de0627425a59add65316b618389662f9a5702df461f191d64327f98
-
Size
305KB
-
MD5
ad0257170bdaa574fe88d1ddba85c63d
-
SHA1
b8f181f6b3c83b75a327ec5ff4b1f6f640753693
-
SHA256
d773f0e07de0627425a59add65316b618389662f9a5702df461f191d64327f98
-
SHA512
70079f2a20fa4102f8318585cafa4d514f9b5755ffd1d2dbfc2e3ffc107f4cfe9513fc3aad764f96455eb652b795deca02d74920908a6ecd210dcf86bb92bff2
-
SSDEEP
6144:Y9U6r+edqw+h0898teq1F3pbWgpivC9FTPtEiTBdfDJl1:m1r+BeteqPZbWgpivC9FTeiTTfD
Malware Config
Signatures
Files
-
d773f0e07de0627425a59add65316b618389662f9a5702df461f191d64327f98.exe windows x86
795c1021b4f8c24f60c1d6adf49bf545
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileStringW
GetModuleFileNameA
TlsGetValue
GetCurrentProcessId
ReadFile
GetCurrentThreadId
HeapCreate
EnterCriticalSection
EnumCalendarInfoW
GetNumberFormatW
ResumeThread
GetConsoleAliasW
lstrlenW
FindClose
LocalFree
GetModuleHandleA
SetEvent
FindAtomW
GetDriveTypeW
SetLastError
user32
GetKeyboardType
DispatchMessageA
GetKeyState
GetClassInfoA
GetSysColor
DrawTextA
GetClientRect
CallWindowProcW
SetFocus
GetMenuInfo
GetCursorInfo
DispatchMessageA
IsWindow
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ