Static task
static1
Behavioral task
behavioral1
Sample
bdc37245eebc6e04c659da6155ff3a248be73217bfdbcae02fb62be596743ecb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bdc37245eebc6e04c659da6155ff3a248be73217bfdbcae02fb62be596743ecb.exe
Resource
win10v2004-20221111-en
General
-
Target
bdc37245eebc6e04c659da6155ff3a248be73217bfdbcae02fb62be596743ecb
-
Size
15KB
-
MD5
096dfd943cb23b97b4241fe11aaac36d
-
SHA1
62aee50e37eac695d8b094c41dfa52e18523a720
-
SHA256
bdc37245eebc6e04c659da6155ff3a248be73217bfdbcae02fb62be596743ecb
-
SHA512
70580c5a1b0bb668c2dc87e49b73188fa5a7cbd4763d8f115008e1315366d18baf234837dcbc4374725a68c04cc9f5faa0553982243be24c9455f1cd382f6b58
-
SSDEEP
192:J1qCg+3NbK6CM+gKnVqxsBc5pYS9Ye5CI:Ld3c6r+TVQc+f9jn
Malware Config
Signatures
Files
-
bdc37245eebc6e04c659da6155ff3a248be73217bfdbcae02fb62be596743ecb.exe windows x86
1b51dbe324150688ce5e3a0742d34a26
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
accept
htonl
SetServiceA
gethostbyaddr
listen
closesocket
bind
htons
sethostname
urlmon
ZonesReInit
DllCanUnloadNow
IsAsyncMoniker
IsValidURL
URLDownloadW
Extract
CreateAsyncBindCtx
Sections
.text Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE