Static task
static1
Behavioral task
behavioral1
Sample
472068dfd72555eba972244e94c7d80e469c0f261080dcf5272c0416e822fe35.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
472068dfd72555eba972244e94c7d80e469c0f261080dcf5272c0416e822fe35.exe
Resource
win10v2004-20220812-en
General
-
Target
472068dfd72555eba972244e94c7d80e469c0f261080dcf5272c0416e822fe35
-
Size
297KB
-
MD5
be15d12db47635a8f6494531a635cb60
-
SHA1
216238ab3e99b90e19843468e5c28bc9c743160e
-
SHA256
472068dfd72555eba972244e94c7d80e469c0f261080dcf5272c0416e822fe35
-
SHA512
d635b53789db55e02c8436de24ae8bf6ceecaf766b28d56fda9ffcac2a6425e97f15d737004b72d3f178a7d0c15d2b38dba77ee9061a057cf519ac621e955dd3
-
SSDEEP
6144:EuRtcVeFQiBemsDexAs7cEqoGwLrt2XgxGe7AiyFJD00NvmD0ArZNtZkiqJYW9f/:3Mm0pN1WrAQxGaA60NvVArfqPdT
Malware Config
Signatures
Files
-
472068dfd72555eba972244e94c7d80e469c0f261080dcf5272c0416e822fe35.exe windows x86
945be7b846df079a0189dd041a318375
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetDriveTypeW
GetStdHandle
FileTimeToLocalFileTime
lstrcmpiA
lstrcmpiA
GetModuleHandleA
IsValidLocale
DeleteFileA
CreateNamedPipeA
Sleep
WaitForSingleObject
CreateMailslotA
lstrcmpiA
GetProcessHeap
SuspendThread
GetLogicalDriveStringsA
GetVolumePathNameA
lstrlenA
lstrcmpiA
GetModuleFileNameA
SetLastError
lstrcmpiA
rastls
DllGetClassObject
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 288KB - Virtual size: 292KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rts Size: 1024B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ