Static task
static1
Behavioral task
behavioral1
Sample
0526fc8fa91c3ad5d02e9ff1c79c565377f18d7b69a923f8a5123b14c4b1fcd3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0526fc8fa91c3ad5d02e9ff1c79c565377f18d7b69a923f8a5123b14c4b1fcd3.exe
Resource
win10v2004-20220812-en
General
-
Target
0526fc8fa91c3ad5d02e9ff1c79c565377f18d7b69a923f8a5123b14c4b1fcd3
-
Size
368KB
-
MD5
036c65839027174db6200a5849799b80
-
SHA1
943ba296eddd5d41b0a42d07c0ab1b6c09dd3572
-
SHA256
0526fc8fa91c3ad5d02e9ff1c79c565377f18d7b69a923f8a5123b14c4b1fcd3
-
SHA512
3c5499c55be00a72b8d3b54f2923bed7f9dcad8f207c93ced2c9b45f2ee984f5b5f1c12dd0fa3d1fe05b669ec0b586ea34f1eeee7b756e0cedf8fa721da795bc
-
SSDEEP
6144:7qlRMahrVf/DRauRHlwrFYaN5ino7241GtMqzIXPH8CV+mybPzKP3zUeXm9+r:7qlRMErpDneFNzino7IUHybPzQjUeX
Malware Config
Signatures
Files
-
0526fc8fa91c3ad5d02e9ff1c79c565377f18d7b69a923f8a5123b14c4b1fcd3.exe windows x86
748b665419de0ba24f70da34d43c5e8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
SetEvent
ResumeThread
CreateEventW
SetLastError
HeapCreate
GetConsoleAliasW
ReadFile
EnumCalendarInfoW
GetCurrentThreadId
GetPrivateProfileStringW
TlsGetValue
GetModuleHandleA
FindClose
EnterCriticalSection
lstrlenW
FindAtomW
GetDriveTypeW
GetNumberFormatW
LocalFree
user32
GetCursorInfo
DispatchMessageA
DrawTextA
GetKeyState
CallWindowProcW
DispatchMessageA
GetMenuInfo
GetClientRect
GetClassInfoA
GetKeyboardType
IsWindow
SetFocus
GetSysColor
unimdmat
UmCloseModem
UmCloseModem
UmCloseModem
UmCloseModem
UmCloseModem
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 492KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 358KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ