Static task
static1
Behavioral task
behavioral1
Sample
203ef49aa4d4eab778e4555936aa07da1e806733fa3fd8157e19d55b82259e50.exe
Resource
win7-20220812-en
General
-
Target
203ef49aa4d4eab778e4555936aa07da1e806733fa3fd8157e19d55b82259e50
-
Size
240KB
-
MD5
ce1855e7498735bbf26c9dfb783f29f6
-
SHA1
6a96cc86836ba720cfafdb34c7da45a1a0aa23d6
-
SHA256
203ef49aa4d4eab778e4555936aa07da1e806733fa3fd8157e19d55b82259e50
-
SHA512
1fa57d289a824659aa5b23254f3019e15ca9e0a6ab03d10b940379fc135328d09d9146553ecd4e9d3400157f935d6325becc4159045efa5c3c89d9a0b64662ee
-
SSDEEP
6144:stHXI24tWD5EdjuLu+o4L0MRgSHiDBnaqHBHXOfEEM4ZcpHn7o37nAhvHDHOMNRA:OR5JLy4FeDQLAPSPWEx
Malware Config
Signatures
Files
-
203ef49aa4d4eab778e4555936aa07da1e806733fa3fd8157e19d55b82259e50.exe windows x86
d8830768e26d5542e5a19dad95d6bbc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
ExitProcess
user32
FindWindowA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE