Static task
static1
Behavioral task
behavioral1
Sample
ef98de757cfc7ce65cd217fba1fbb3fbc1c978f3cf7adbe5ee334d077473ffc3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef98de757cfc7ce65cd217fba1fbb3fbc1c978f3cf7adbe5ee334d077473ffc3.exe
Resource
win10v2004-20221111-en
General
-
Target
ef98de757cfc7ce65cd217fba1fbb3fbc1c978f3cf7adbe5ee334d077473ffc3
-
Size
239KB
-
MD5
faed760820fd59389073bc5a368bf498
-
SHA1
ed34ec73c764d12820bb3fe264f8cd4cb54899e0
-
SHA256
ef98de757cfc7ce65cd217fba1fbb3fbc1c978f3cf7adbe5ee334d077473ffc3
-
SHA512
e4b94cd4a644d74ad7d1d978231fc4dac7b88aaf24922bcc638b0f0b0268a6c866b19fb4e374801fcc9445a46cc1a036d9414251607c966152d77fd24c459d8e
-
SSDEEP
6144:RcMiws+MVGtRyFDqHJJ5L8PYZExSN7ecvqsNdOIrlKG1v:RcMW1SRoDO7y3xWecvqs/tKY
Malware Config
Signatures
Files
-
ef98de757cfc7ce65cd217fba1fbb3fbc1c978f3cf7adbe5ee334d077473ffc3.exe windows x86
c2006413a2d66df6c5668d031df051ef
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateDCA
SelectObject
DeleteObject
GetDeviceCaps
BitBlt
GetObjectA
GetBitmapBits
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
kernel32
GetCurrentThreadId
GetStdHandle
FlushConsoleInputBuffer
GlobalMemoryStatus
CloseHandle
FreeLibrary
GetThreadTimes
SetLastError
GetFileType
SetErrorMode
VirtualAllocEx
user32
MessageBoxIndirectA
wsock32
socket
connect
inet_ntoa
closesocket
WSAGetLastError
WSAStartup
bind
WSACleanup
accept
gethostbyname
ntohs
WSASetLastError
send
htons
shutdown
htonl
WSACancelBlockingCall
getservbyname
listen
setsockopt
getsockopt
ntohl
recv
ole32
CoIsOle1Class
CoDisconnectObject
CoGetInstanceFromFile
CoGetClassObject
OleUninitialize
kbdfc
KbdLayerDescriptor
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 271KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ