Static task
static1
Behavioral task
behavioral1
Sample
PUEBAA~1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PUEBAA~1.exe
Resource
win10v2004-20221111-en
General
-
Target
61b93f312aa313af1177bdb2e1ef45a802b691db4a6ae6a627258c03e4459c9d
-
Size
24KB
-
MD5
906b714fe20d8988e34b3f3a188815ed
-
SHA1
b0d05a52051fde4ba61d5ff8549554b87b68e750
-
SHA256
61b93f312aa313af1177bdb2e1ef45a802b691db4a6ae6a627258c03e4459c9d
-
SHA512
38a8481f948952e68ae4f7b83550d8ac82f6e7971712e6d4c6a91644acd44d2102b16ae9900acb50d2630194c147100c4331b902d3dba5d5618b396dd92df2e8
-
SSDEEP
768:Lv13ccx5csDH4ABbbWeeuX0aqcL/ADF8Fu/jPKTrL:D1jvTY9G0aHzg+rL
Malware Config
Signatures
Files
-
61b93f312aa313af1177bdb2e1ef45a802b691db4a6ae6a627258c03e4459c9d.cab
-
PUEBAA~1.EXE.exe windows x86
28c6ef1128d2dc0d513ddf64919b7716
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetProcessHeap
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE