Static task
static1
Behavioral task
behavioral1
Sample
ad2cca19f77b4cc6b64d4d4c21b1dbdc2504cc9a5c1fc9644c73ee8cd8f84a9c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad2cca19f77b4cc6b64d4d4c21b1dbdc2504cc9a5c1fc9644c73ee8cd8f84a9c.exe
Resource
win10v2004-20221111-en
General
-
Target
ad2cca19f77b4cc6b64d4d4c21b1dbdc2504cc9a5c1fc9644c73ee8cd8f84a9c
-
Size
15.0MB
-
MD5
ed327518d45b5760f67e4c7efd685d03
-
SHA1
bf7ce888f7ddd2fdf01fc69696d44376520c7930
-
SHA256
ad2cca19f77b4cc6b64d4d4c21b1dbdc2504cc9a5c1fc9644c73ee8cd8f84a9c
-
SHA512
1aa7d8c3351e1b102eede0fb10cb76d829a6e745f10d96b3497f06f01dd0b43d77c1611fe011fe2317c6bb017c805008ad476ea228bec05c2918906c9cb73d24
-
SSDEEP
393216:1jMrcQaI5eCGIM5601BEvDpCIAxrwzO23/GJsJNNxlA3:1jSPG560oD0zxGZ3N/G3
Malware Config
Signatures
Files
-
ad2cca19f77b4cc6b64d4d4c21b1dbdc2504cc9a5c1fc9644c73ee8cd8f84a9c.exe windows x86
d102ea5255ddeb64788bd84dd96b2d88
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommModemStatus
ReadConsoleInputA
RtlMoveMemory
SetStdHandle
GetSystemInfo
VirtualAllocEx
GetConsoleHardwareState
SetUnhandledExceptionFilter
OpenSemaphoreA
FlushFileBuffers
CreateNamedPipeA
FindClose
OpenMutexA
GetProcessVersion
DeviceIoControl
SetHandleContext
GetComputerNameA
CreateProcessA
TerminateProcess
GetCommMask
EnumSystemLocalesA
AllocConsole
dpmodemx
SPInit
advapi32
CredFree
CredMarshalCredentialW
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 670KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 490KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ