Static task
static1
Behavioral task
behavioral1
Sample
a39d6f23b88fd7fef00239eb5e53207d723b0b50e100cd142dc9ca146266f6a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a39d6f23b88fd7fef00239eb5e53207d723b0b50e100cd142dc9ca146266f6a0.exe
Resource
win10v2004-20221111-en
General
-
Target
a39d6f23b88fd7fef00239eb5e53207d723b0b50e100cd142dc9ca146266f6a0
-
Size
29KB
-
MD5
27160b09cff6976ddd920a4f5bb58a80
-
SHA1
e52b0bdd43a80e77041d4ca37012f1d54ee8eb4b
-
SHA256
a39d6f23b88fd7fef00239eb5e53207d723b0b50e100cd142dc9ca146266f6a0
-
SHA512
d61a3eb6f3e7a31691c2bbf97edcbc88997e87a9d393cab20e72ed625eab3144268deed4c80e5909bf56ae1062e0ee267b015e81996c3258cca248b8502f20d2
-
SSDEEP
768:5CVmE8e8+E9A597Mbtj3xDO81lI1TMf/XtXShHR:5Memb7Mbtj3xuTMfft8R
Malware Config
Signatures
Files
-
a39d6f23b88fd7fef00239eb5e53207d723b0b50e100cd142dc9ca146266f6a0.exe windows x86
ca09dfaf76cc3495c85eefe3a13d2ee1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAStartup
htons
htonl
socket
bind
listen
accept
recv
send
kernel32
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ExitProcess
CreateFileA
WriteConsoleA
RtlUnwind
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
HeapValidate
GetSystemTimeAsFileTime
GetStartupInfoA
GetFileType
GetStdHandle
GetCurrentProcess
DuplicateHandle
SetHandleCount
GetCommandLineA
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetConsoleCtrlHandler
WriteFile
GetLastError
VirtualAlloc
VirtualQuery
CloseHandle
SetFilePointer
SetStdHandle
DeleteFileA
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE