Behavioral task
behavioral1
Sample
f972998cc4fa1283da899e185d5a3a75e294dd5e684f010261f18b4ff29772ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f972998cc4fa1283da899e185d5a3a75e294dd5e684f010261f18b4ff29772ef.exe
Resource
win10v2004-20221111-en
General
-
Target
f972998cc4fa1283da899e185d5a3a75e294dd5e684f010261f18b4ff29772ef
-
Size
340KB
-
MD5
28766e894543bd0be2ba23c76b4627d0
-
SHA1
130566d4b5a784879f865bfad060e93938164eb2
-
SHA256
f972998cc4fa1283da899e185d5a3a75e294dd5e684f010261f18b4ff29772ef
-
SHA512
0d4ed4b894a1231ee418288fbc45d8920f6f01913bd7defd670f967c4cf19badd166f16f0fdd0a5f90a723316113c1812e2ebb3d1473b955a6dd747940e1b438
-
SSDEEP
1536:NIBCmKNEmLr5+BAjhfSw+BNI7/dVlJbZUXnnqTZKUs:NAQxjhnZJVlJFUXnnqTZK
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
Files
-
f972998cc4fa1283da899e185d5a3a75e294dd5e684f010261f18b4ff29772ef.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ