Static task
static1
Behavioral task
behavioral1
Sample
e491f4d167d05eb65bc00d70c599ba94003afa1c05c065d786b3ec3faed16a93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e491f4d167d05eb65bc00d70c599ba94003afa1c05c065d786b3ec3faed16a93.exe
Resource
win10v2004-20220901-en
General
-
Target
e491f4d167d05eb65bc00d70c599ba94003afa1c05c065d786b3ec3faed16a93
-
Size
92KB
-
MD5
68d403724053fa851320a67d0fbda26d
-
SHA1
2473110dde6a7b09664010e51b92a7e76dbe26ba
-
SHA256
e491f4d167d05eb65bc00d70c599ba94003afa1c05c065d786b3ec3faed16a93
-
SHA512
f25107005f53835845f3d42b321755a73ef3ad2ee08c9d54a85dfd465febdde6580f15bcc3cf46619227b6339996c0ea33d734706e69c3d1ac6a3522e84024d7
-
SSDEEP
768:dh3IOV77Xw5rEbwaHWyFk8zJ8PfTfaUCEvF5BRwEQ5jmWcv0+w6dUbXLu2Rljd5+:dh3IOd7X0gbw/c8PfDfCArBRwX1wgH
Malware Config
Signatures
Files
-
e491f4d167d05eb65bc00d70c599ba94003afa1c05c065d786b3ec3faed16a93.exe windows x86
8d2a607ce36c6bac7428d1574a715af3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasSetEntryDialParamsA
RasHangUpA
RasDialA
RasGetErrorStringA
RasSetEntryPropertiesA
RasEnumDevicesA
RasGetConnectStatusA
RasEnumConnectionsA
RasDeleteEntryA
shlwapi
SHGetValueA
SHSetValueA
wsock32
recv
accept
gethostname
ioctlsocket
htonl
WSACleanup
select
gethostbyname
closesocket
htons
bind
setsockopt
socket
ntohs
WSAStartup
sendto
send
getsockname
inet_ntoa
listen
WSAGetLastError
mfc42
ord2725
ord6438
ord2621
ord1576
ord3079
ord1783
ord4055
ord2938
ord6215
ord5953
ord1200
ord825
ord823
ord5265
ord4998
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord1168
ord4080
ord4627
ord4425
ord3597
ord324
ord641
ord4234
ord6199
ord4710
ord2379
ord2645
ord3098
ord755
ord470
ord4224
ord3092
ord4853
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4376
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord4424
ord3738
ord561
ord815
ord5943
ord1134
ord1146
msvcrt
_strnicmp
_ltoa
_setmbcp
_stricmp
system
rand
srand
_controlfp
sprintf
strncmp
strchr
sscanf
time
__CxxFrameHandler
fclose
fwrite
fopen
isdigit
strtoul
fprintf
fputs
fgets
exit
_except_handler3
_XcptFilter
_ftol
_acmdln
tolower
fread
__dllonexit
_onexit
_exit
__setusermatherr
__getmainargs
_initterm
__p__fmode
_adjust_fdiv
__p__commode
__set_app_type
kernel32
DeleteFileA
GetStartupInfoA
GetModuleHandleA
GetCommandLineA
GetShortPathNameA
Sleep
GetExitCodeProcess
SetLocaleInfoA
GetVersionExA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
CreateProcessA
MoveFileExA
lstrcpyA
GetLocaleInfoA
user32
LoadIconA
GetWindowTextA
EnumWindows
HideCaret
ShowScrollBar
ShowWindow
MessageBoxA
IsIconic
wsprintfA
SetTimer
KillTimer
EnableWindow
SendMessageA
GetSystemMetrics
PostMessageA
DrawIcon
GetClientRect
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegSetValueExA
shell32
Shell_NotifyIconA
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ