Behavioral task
behavioral1
Sample
24f2a7a143d61e29281d7c3eec97da0b34afda759e3ccf173ddd0a1bb4ca5e28.exe
Resource
win7-20220812-en
General
-
Target
24f2a7a143d61e29281d7c3eec97da0b34afda759e3ccf173ddd0a1bb4ca5e28
-
Size
34KB
-
MD5
eabaa34ecef5051385c12c06a59fb982
-
SHA1
18552c814f5d877cf40dd4b933e1c90f311a39c5
-
SHA256
24f2a7a143d61e29281d7c3eec97da0b34afda759e3ccf173ddd0a1bb4ca5e28
-
SHA512
fafbea3bf1ae47d7a77c9120815326694d4a26ea49eed352dd2002bf8c5d19b2e9654d40388c99196a8e60a41623541b056f60743872c693da74cef17a7511c0
-
SSDEEP
768:cRFcm2wdRawt9YCqObgarB8ZU7XsSeuVeeP7GiQS/+neKA9zafr5kWHvH3:Ug8awt9hgaN/xVwTlAtVUX
Malware Config
Extracted
pony
http://188.166.15.172/pony/Panel/gate.php
Signatures
Files
-
24f2a7a143d61e29281d7c3eec97da0b34afda759e3ccf173ddd0a1bb4ca5e28.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE