Static task
static1
Behavioral task
behavioral1
Sample
fe81c39f3b2cf603679d4641e4d682fec59056b479455c36e99aeb89302665f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe81c39f3b2cf603679d4641e4d682fec59056b479455c36e99aeb89302665f6.exe
Resource
win10v2004-20220812-en
General
-
Target
fe81c39f3b2cf603679d4641e4d682fec59056b479455c36e99aeb89302665f6
-
Size
152KB
-
MD5
4d1f4f9b6cb3f4bc6cdb187504a32085
-
SHA1
59858a0d3935994db2e65929d8c97afaa6665a11
-
SHA256
fe81c39f3b2cf603679d4641e4d682fec59056b479455c36e99aeb89302665f6
-
SHA512
17ebaba2ae13ae1641f72e216e19a97d61cd81f494d134f8508d093de7342197f0a8bfe1992d75d5bce55406b05871d48a7ef7fdbb557f04639f17b47fc68014
-
SSDEEP
1536:RBt9TrwCcc1xqW2GJsMZp3waXx+Fv7vc1+mlQYLmxxPNTr/g8Dv6pWjog9tDG:L/wCcc4SZp3DXYn+0NPJDvljB9tD
Malware Config
Signatures
Files
-
fe81c39f3b2cf603679d4641e4d682fec59056b479455c36e99aeb89302665f6.exe windows x86
51baa70c0518d83ab24add6dff28590a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
getpeername
ioctlsocket
gethostname
connect
inet_ntoa
WSAStartup
inet_addr
select
WSAGetLastError
htons
ntohs
shutdown
setsockopt
sendto
recv
socket
closesocket
gethostbyname
send
wininet
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
HttpQueryInfoA
kernel32
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RaiseException
SetFilePointer
CreateFileA
lstrlenA
WriteFile
lstrcatA
CloseHandle
DeleteFileA
lstrcpynA
FreeLibrary
HeapAlloc
SetEndOfFile
SystemTimeToFileTime
InterlockedDecrement
HeapFree
WaitForSingleObject
GetTimeFormatA
GetTickCount
GetProcessHeap
ExpandEnvironmentStringsA
GetDateFormatA
InitializeCriticalSection
WideCharToMultiByte
Sleep
LeaveCriticalSection
GetFileAttributesA
CreateProcessA
GetTimeZoneInformation
GetLastError
GetProcAddress
EnterCriticalSection
GetTempFileNameA
GetLocalTime
LoadLibraryA
LocalAlloc
GetExitCodeThread
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
DeleteCriticalSection
LocalSize
GetTempPathA
LocalFree
GetSystemTime
lstrcpyA
InterlockedIncrement
CreateThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetCommandLineA
GetVersionExA
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCPInfo
GetACP
GetOEMCP
HeapSize
RtlUnwind
MultiByteToWideChar
ReadFile
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE