Static task
static1
Behavioral task
behavioral1
Sample
cb03f75a0993c62a35a471366170de991bdc8f53f366c849c177df2305e7679b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cb03f75a0993c62a35a471366170de991bdc8f53f366c849c177df2305e7679b.exe
Resource
win10v2004-20221111-en
General
-
Target
cb03f75a0993c62a35a471366170de991bdc8f53f366c849c177df2305e7679b
-
Size
409KB
-
MD5
2b3954d420b8b400fb7b4f20b8a578b0
-
SHA1
84e96fc78ced859ac1027028bf5fbad430424469
-
SHA256
cb03f75a0993c62a35a471366170de991bdc8f53f366c849c177df2305e7679b
-
SHA512
f027fde40faa1e876d625c73b23e42890b5418c040e27688adfa028f27c31b71e8e445bcb8cc5895334294cf4e65fc689fb36ce56b795e0b46a28052e449566c
-
SSDEEP
6144:LodqSk62RZCGDblHv+l6PmLqVWjkEQ5pSZDAkHwlU2w3nxLWWzXGuTV/V4g/DY3G:Mdq5ZCCJHvGpGWj5iQ0xI1WmRVPbcU
Malware Config
Signatures
Files
-
cb03f75a0993c62a35a471366170de991bdc8f53f366c849c177df2305e7679b.exe windows x86
74d5098070a0cb762afdc27ce0f2503c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
GetConsoleTitleW
WriteFile
Sleep
FindClose
GetTickCount
CloseHandle
GetCommandLineA
GetModuleFileNameW
GetExitCodeProcess
GlobalSize
DeleteFileA
DeviceIoControl
CloseHandle
GetDriveTypeW
GetStartupInfoA
GlobalFlags
lstrlenW
GetFileTime
GetModuleHandleA
user32
FillRect
GetParent
GetWindowLongW
BeginPaint
CallWindowProcW
PeekMessageA
DispatchMessageA
DestroyWindow
SetFocus
LoadImageA
DrawTextW
IsZoomed
DispatchMessageA
hhsetup
??0CFolder@@QAE@XZ
??0CFolder@@QAE@XZ
??0CFolder@@QAE@XZ
??0CFolder@@QAE@XZ
wininet
FtpCommandA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 512KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 402KB - Virtual size: 401KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ