Static task
static1
Behavioral task
behavioral1
Sample
981ae24544a83e3df873d15e21ede47acbece118cb5407d0dd631553e96c5af2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
981ae24544a83e3df873d15e21ede47acbece118cb5407d0dd631553e96c5af2.exe
Resource
win10v2004-20220812-en
General
-
Target
981ae24544a83e3df873d15e21ede47acbece118cb5407d0dd631553e96c5af2
-
Size
116KB
-
MD5
6da45eb0090934c6fcff0a8f24dd3d3a
-
SHA1
328bfcddf9e9249cdba0a72808500adfbb4f42c5
-
SHA256
981ae24544a83e3df873d15e21ede47acbece118cb5407d0dd631553e96c5af2
-
SHA512
7294cdd32288d1d2987dcd4e721e761d2b0c36b7188990f3c254db91f22b49db83c4db2dcdcdaa6ef832b7a1ac2ac7362cd20af62a290044f729e2dd0a228701
-
SSDEEP
1536:pI10linT4EX4omc53/H9GNMBSDRHfqkkJTZWHOVcnisRAzAAV4KJtKKWTI6Snd4V:6Olulj3/H9/Boq3WHucipIBBKf
Malware Config
Signatures
Files
-
981ae24544a83e3df873d15e21ede47acbece118cb5407d0dd631553e96c5af2.exe windows x86
c492b5db274884ca4ce3e1cd1edd7213
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
VirtualFree
RemoveDirectoryA
Sleep
ExitProcess
Sections
.text Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Ucaof, F Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Xiokex V Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Fjermuwu Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 173B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gcwrnmr Size: - Virtual size: 84KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE