Static task
static1
Behavioral task
behavioral1
Sample
d7c9c5d47a43c73a1e9dbb0d911f4eb9bb03d3bc2f0aa6636ed01957b1c5e9df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7c9c5d47a43c73a1e9dbb0d911f4eb9bb03d3bc2f0aa6636ed01957b1c5e9df.exe
Resource
win10v2004-20220901-en
General
-
Target
d7c9c5d47a43c73a1e9dbb0d911f4eb9bb03d3bc2f0aa6636ed01957b1c5e9df
-
Size
409KB
-
MD5
2705029e28684db36ce390288674efb0
-
SHA1
9adeba1b8c0d546bff7a31d179e40b872bdb7500
-
SHA256
d7c9c5d47a43c73a1e9dbb0d911f4eb9bb03d3bc2f0aa6636ed01957b1c5e9df
-
SHA512
0751cff18cb6ca7e1896afcae86c099a7a453a32c6b60323f15aa515a9f146bf1e64382f7fe6019b966a3bbeb5ed369e5911575234f8580cdada25be8852e77d
-
SSDEEP
6144:+juup44qSk62RZCGDblHv+l6PmLqVWjkEQ5pSZDAkHwlU2w3nxLWWzXGuTV/V4g/:+rfq5ZCCJHvGpGWj5iQ0xI1WmRVPbcU
Malware Config
Signatures
Files
-
d7c9c5d47a43c73a1e9dbb0d911f4eb9bb03d3bc2f0aa6636ed01957b1c5e9df.exe windows x86
758b9fecc2984446a55bc8672a60f20c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
DeleteFileA
VirtualAllocEx
GlobalFlags
FindClose
CloseHandle
GetExitCodeProcess
GetModuleFileNameW
GetConsoleTitleW
GetDriveTypeW
lstrlenW
GetModuleHandleA
WriteFile
GlobalSize
Sleep
GetTickCount
DeviceIoControl
GetStartupInfoA
CloseHandle
GetFileTime
user32
LoadImageA
PeekMessageA
IsZoomed
SetFocus
FillRect
DestroyWindow
GetParent
DrawTextW
DispatchMessageA
BeginPaint
GetWindowLongW
DispatchMessageA
CallWindowProcW
hhsetup
??0CFolder@@QAE@XZ
??0CFolder@@QAE@XZ
??0CFolder@@QAE@XZ
??0CFolder@@QAE@XZ
wininet
FtpCommandA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 512KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 402KB - Virtual size: 401KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ