Behavioral task
behavioral1
Sample
b420f9b995dc1b1135167b4577937fc67cd4b92e41384e12be2140af62cf257e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b420f9b995dc1b1135167b4577937fc67cd4b92e41384e12be2140af62cf257e.exe
Resource
win10v2004-20220812-en
General
-
Target
b420f9b995dc1b1135167b4577937fc67cd4b92e41384e12be2140af62cf257e
-
Size
5.9MB
-
MD5
f8bcb1ea3c0bf8f64fa7187ab73cb3fe
-
SHA1
a525f3a786bc0e93310863bdc9996449f1bd0129
-
SHA256
b420f9b995dc1b1135167b4577937fc67cd4b92e41384e12be2140af62cf257e
-
SHA512
9cbf7e6c1d7ed26163ced83c675a0f5b5f14fd8da653261cbf9160d5fa22023728e7af51cb601c8330ece01feec0999f77d150123d7b85720b796dfc422ce234
-
SSDEEP
24576:tvhaNC17Jlw5K5GBBJWhcIJaLa1dc46Q/7L4SsCtvc4sAUj6Ewnv:tvAgdiIjL5siFv
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
Files
-
b420f9b995dc1b1135167b4577937fc67cd4b92e41384e12be2140af62cf257e.exe windows x86
87bed5a7cba00c7e1f4015f1bdae2183
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
Sections
kkrunchy Size: 5.9MB - Virtual size: 5.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE