Static task
static1
Behavioral task
behavioral1
Sample
1f03fe350d2c76414de90a7624d836437391b4b3164ab7e26e682e47d311dfb8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1f03fe350d2c76414de90a7624d836437391b4b3164ab7e26e682e47d311dfb8.exe
Resource
win10v2004-20221111-en
General
-
Target
1f03fe350d2c76414de90a7624d836437391b4b3164ab7e26e682e47d311dfb8
-
Size
85KB
-
MD5
d128bdd1447317876022560ac405c120
-
SHA1
0444da3b9885139d275e20252dfc28c119f6ee78
-
SHA256
1f03fe350d2c76414de90a7624d836437391b4b3164ab7e26e682e47d311dfb8
-
SHA512
856c9eb8691c51c5e5c38f494d82474d9038317fc0688825a516a0fabfa8d6cd0daf87bde49a5f83c6d5146317c625d1a823fae5eef8b62e64bed040107f0fdf
-
SSDEEP
1536:vPIIgZedpOjYMgmdVdH39tpey01DzC7dJCBMpN5s:3IId4jfNdV1U/1vCJNpY
Malware Config
Signatures
Files
-
1f03fe350d2c76414de90a7624d836437391b4b3164ab7e26e682e47d311dfb8.exe windows x86
8451d8ef30180670b91d8675a51d9df5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleCtrlHandler
FoldStringA
GetUserGeoID
DebugSetProcessKillOnExit
SignalObjectAndWait
MultiByteToWideChar
SetFileValidData
GetCPInfoExA
DeleteFileA
DebugActiveProcessStop
InterlockedDecrement
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 70KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE