Static task
static1
Behavioral task
behavioral1
Sample
46b92588803d3411884bd4042f98a2591131f324a14d0d39d18bf7c22fcc3bc2.exe
Resource
win7-20221111-en
General
-
Target
46b92588803d3411884bd4042f98a2591131f324a14d0d39d18bf7c22fcc3bc2
-
Size
113KB
-
MD5
4800424bc890ed3053a61838deb0868f
-
SHA1
6413241c68a74ebfc715c41e7af6081f367ced9d
-
SHA256
46b92588803d3411884bd4042f98a2591131f324a14d0d39d18bf7c22fcc3bc2
-
SHA512
8fa16d56b27930f08ff05b4305dc061cd3bc61e757d0288ca05070c32ae97675a071687dcab3f19a0fd9a6a7ab7385d8f473617dc794c56192b698737b5e000f
-
SSDEEP
3072:OJPsu0el5clsBd00AcMYcRBd3AXzqaLYuu:g0ol5n1MxRBqDqoYuu
Malware Config
Signatures
Files
-
46b92588803d3411884bd4042f98a2591131f324a14d0d39d18bf7c22fcc3bc2.exe windows x86
fcb208247938b0c26260d8c91f3fe4e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
GetModuleHandleA
GetProcessHeap
lstrcmpiA
DeleteFileA
CreateMailslotA
IsValidCodePage
WaitForSingleObject
FileTimeToLocalFileTime
lstrcmpiA
GetModuleFileNameA
GetLogicalDriveStringsA
HeapCreate
lstrcmpiA
SuspendThread
GetDriveTypeW
SetLastError
GetStdHandle
Sleep
GetVolumePathNameA
lstrlenA
lstrcmpiA
CreateNamedPipeA
rasdlg
RasDialDlgA
RasEntryDlgA
DwTerminalDlg
RouterEntryDlgA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rts Size: 1024B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ