Static task
static1
Behavioral task
behavioral1
Sample
c6e69548b44eed2271e6393e5be48432a73fe8456167e4bf3b566f43ff890ac2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6e69548b44eed2271e6393e5be48432a73fe8456167e4bf3b566f43ff890ac2.exe
Resource
win10v2004-20220901-en
General
-
Target
c6e69548b44eed2271e6393e5be48432a73fe8456167e4bf3b566f43ff890ac2
-
Size
306KB
-
MD5
e6d138cd49aaae6ecf7729bfa3a9aba3
-
SHA1
58406411eb2ef1dc3e324522d0da598f153d5259
-
SHA256
c6e69548b44eed2271e6393e5be48432a73fe8456167e4bf3b566f43ff890ac2
-
SHA512
b556f009a0b0093e9b3f793019ae985cf99a95006d0df38a054c3bf858d13c37c022a050edfb379792887e8f2d10aa60e39f3d9ff4067b020f85954885876372
-
SSDEEP
6144:kicGRk3T/Mju6mRjBdutc7E6dReZr6uB+C1/qVq2Zb6W:kicck3ojDmXktc7E6dReZuux1yY
Malware Config
Signatures
Files
-
c6e69548b44eed2271e6393e5be48432a73fe8456167e4bf3b566f43ff890ac2.exe windows x86
c76cf57759f15c98384206e133853ddf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomW
GetCommandLineW
HeapCreate
lstrlenA
GetTickCount
ResetEvent
ExitProcess
LoadLibraryA
GetModuleHandleW
GetDriveTypeW
GetTickCount
CreateFileA
GetDiskFreeSpaceW
ReleaseMutex
CloseHandle
GetComputerNameW
ReleaseMutex
GetSystemTime
GetFileAttributesA
LocalFree
user32
FillRect
GetCaretPos
CallWindowProcA
DispatchMessageA
CreateWindowExA
EndDialog
DrawStateA
GetDlgItem
GetClassInfoA
CloseWindow
GetClientRect
GetMenu
DestroyCaret
rasapi32
DwCloneEntry
DwRasUninitialize
RasDialA
RasDeleteEntryA
DwEnumEntryDetails
adsnt
DllGetClassObject
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ