Behavioral task
behavioral1
Sample
a893c72a5fc3320da02fad841a4dff4b2bd3e065077e1f82cce6ef86c13e55ca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a893c72a5fc3320da02fad841a4dff4b2bd3e065077e1f82cce6ef86c13e55ca.exe
Resource
win10v2004-20221111-en
General
-
Target
a893c72a5fc3320da02fad841a4dff4b2bd3e065077e1f82cce6ef86c13e55ca
-
Size
275KB
-
MD5
38a1616c2ad2214076ee21f6c0270a40
-
SHA1
21b850dc0c3d8f8c80110bd788107b4bc1997647
-
SHA256
a893c72a5fc3320da02fad841a4dff4b2bd3e065077e1f82cce6ef86c13e55ca
-
SHA512
038ed969580e0371d49b18dd7a749d7097843cedf7df7547eb0f561e34eff6b89275ad49a0368d69582277d0924fffca0bf039fae68722dadc12e70f86f2a60a
-
SSDEEP
3072:flnVltjYHSdUH/krZSjz61lSAlXer8u4V4FrdXVx2rnzDTaSuFXM2MblGi9F6e7E:HYi9rkjWJduqyFKrzDTaQ2KlGiX76j
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a893c72a5fc3320da02fad841a4dff4b2bd3e065077e1f82cce6ef86c13e55ca.exe windows x86
e115be65e2e0e54ef485d7c1844f0d0a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
getsockopt
inet_ntoa
__WSAFDIsSet
bind
WSAGetLastError
getsockname
gethostbyname
listen
ntohs
connect
htons
socket
recv
send
select
WSAStartup
closesocket
kernel32
GetFullPathNameA
GetCurrentDirectoryA
FileTimeToLocalFileTime
FileTimeToSystemTime
LoadLibraryA
GetVersion
InitializeCriticalSection
ExitProcess
GetCurrentProcess
GetStartupInfoA
GetModuleHandleA
GetLastError
HeapCreate
MultiByteToWideChar
GetCurrentThreadId
TlsAlloc
GetStringTypeA
GetStringTypeW
RaiseException
GetModuleFileNameA
GetOEMCP
GetEnvironmentStringsW
GetCPInfo
GetACP
GetLocalTime
GetProcAddress
loadperf
InstallPerfDllA
UpdatePerfNameFilesA
BackupPerfRegistryToFileW
wshtcpip
WSHSetSocketInformation
WSHAddressToString
Sections
UPX1 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fCVqJZ Size: 1024B - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 95KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cb Size: 2KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 338KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 121KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.i Size: 1024B - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wr Size: 1KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ