Static task
static1
Behavioral task
behavioral1
Sample
86722bddd81863d88e871fa558574c32a355003186d0e975a6be0055ec7b8443.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
86722bddd81863d88e871fa558574c32a355003186d0e975a6be0055ec7b8443.exe
Resource
win10v2004-20221111-en
General
-
Target
86722bddd81863d88e871fa558574c32a355003186d0e975a6be0055ec7b8443
-
Size
29KB
-
MD5
c91a0ac82835a07c46a6cab640851eae
-
SHA1
55e9efb2067f60611bd728cec965c975750635f5
-
SHA256
86722bddd81863d88e871fa558574c32a355003186d0e975a6be0055ec7b8443
-
SHA512
dcfc4a44a0191ae40c2b6d78ea7127e47695affd8ddd63739f7d477a2ead75faeaa093179127defcfc71464a229e823bbc28b58218ef5fe17337cc8c11071af2
-
SSDEEP
768:v5clp5+9KmhWT3KflHpAj5RfutnMdgx6QKIac6bdgfLsXzrS/LqzTck7lL2tlLyb:dDZNGD4GN0nx45Jf
Malware Config
Signatures
Files
-
86722bddd81863d88e871fa558574c32a355003186d0e975a6be0055ec7b8443.exe windows x86
d190b93044f040bfe995c3cf8e8b1d13
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr71
sprintf
strcat
memcpy
__CxxFrameHandler
??_V@YAXPAX@Z
strchr
strstr
exit
srand
strtok
strncpy
atoi
__dllonexit
_onexit
rand
_exit
_XcptFilter
_ismbblead
_cexit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??1type_info@@UAE@XZ
_CxxThrowException
strcmp
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
??_U@YAPAXI@Z
strcpy
_vsnprintf
strlen
_c_exit
_except_handler3
?terminate@@YAXXZ
oleaut32
VariantClear
SysAllocString
VariantInit
ws2_32
connect
socket
gethostbyname
send
htons
inet_addr
closesocket
kernel32
GetTickCount
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetStartupInfoA
LocalFree
Sleep
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE