Static task
static1
Behavioral task
behavioral1
Sample
6a2f36609565c0c313f9fa07729ff2aa02cd8af3f444a089d565f5db050571ae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a2f36609565c0c313f9fa07729ff2aa02cd8af3f444a089d565f5db050571ae.exe
Resource
win10v2004-20220812-en
General
-
Target
6a2f36609565c0c313f9fa07729ff2aa02cd8af3f444a089d565f5db050571ae
-
Size
65KB
-
MD5
c269f02b43857fdf86041ecafb1f78e6
-
SHA1
ab8b0e43914e8ce4f3c623b538c49bf18ba38164
-
SHA256
6a2f36609565c0c313f9fa07729ff2aa02cd8af3f444a089d565f5db050571ae
-
SHA512
bc928078a06f408fca954ee3d8d452c23f0fc3e5b61e6e6e8c21e0937ea893e7a29d2556dc0e583f6184d059cad040eb9a7ba5a686b1dbb1bbbcd1eda10bf8fc
-
SSDEEP
1536:I2yljnrq8E0ptOHv9cgwYA12uCeMRtDQQo/:HyFnpkwxUreMR5+
Malware Config
Signatures
Files
-
6a2f36609565c0c313f9fa07729ff2aa02cd8af3f444a089d565f5db050571ae.exe windows x86
273ed0fc6b405ff5c9ed80d5a1e53958
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
Heap32First
DeleteFileA
GetConsoleAliasW
GetStringTypeW
GetConsoleTitleA
GetVersion
DeleteFileA
WriteConsoleW
CreateFileMappingW
CreateMailslotW
GetShortPathNameW
GetACP
GetModuleHandleW
DeleteFileA
Heap32Next
GetProcessHeap
SetFilePointer
SetEndOfFile
GetStringTypeW
SetEnvironmentVariableA
VirtualAlloc
LoadLibraryA
msoeacct
DllGetClassObject
ValidEmailAddress
GetDllMajorVersion
DllCanUnloadNow
Sections
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ