Static task
static1
Behavioral task
behavioral1
Sample
abff26c09976fdfb34a1f8b5e6fb6f697b38c3644c696a5ff1b8502bf457d337.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
abff26c09976fdfb34a1f8b5e6fb6f697b38c3644c696a5ff1b8502bf457d337.exe
Resource
win10v2004-20220812-en
General
-
Target
abff26c09976fdfb34a1f8b5e6fb6f697b38c3644c696a5ff1b8502bf457d337
-
Size
29KB
-
MD5
91e6c7ab3df16b48dd496a2813e558e0
-
SHA1
19381ea7e6d06d70821dbb459c2daeb3be50d95e
-
SHA256
abff26c09976fdfb34a1f8b5e6fb6f697b38c3644c696a5ff1b8502bf457d337
-
SHA512
6fe9542b29458062053a9357ba83baede68730bd235d8738256277fa583c9ad70a6756205669d4477539464705d30edcfa6e0465c745bddb488bb1c2e4565dd5
-
SSDEEP
384:nh9J6M8ro5RhmKHShTz9+++O8H7eOKB8dTZP7lTi1j5Tz4zszwNmY3Wa2YiW0VWJ:hhmkRhmLMcTDGZTqld0NmGW5
Malware Config
Signatures
Files
-
abff26c09976fdfb34a1f8b5e6fb6f697b38c3644c696a5ff1b8502bf457d337.exe windows x86
3d1cad531f4aa8bef97dda88cb1bb700
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
atoi
wcscpy
wcslen
memmove
_stricmp
_c_exit
_exit
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
_strnicmp
advapi32
RegNotifyChangeKeyValue
RegEnumKeyW
RegOpenKeyExW
RegisterEventSourceA
ReportEventA
DeregisterEventSource
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegEnumValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumValueW
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
kernel32
LoadLibraryExA
GetProcAddress
WaitForSingleObject
FreeLibrary
DeleteCriticalSection
CreateThread
WaitForSingleObjectEx
GetModuleHandleA
HeapAlloc
HeapFree
CreateEventA
Sleep
lstrcmpiA
CloseHandle
WaitForMultipleObjects
ExpandEnvironmentStringsA
GetLastError
SetEvent
LeaveCriticalSection
EnterCriticalSection
ResumeThread
SetConsoleCtrlHandler
GetTickCount
InitializeCriticalSection
HeapCreate
HeapDestroy
MultiByteToWideChar
snmpapi
SnmpSvcAddrToSocket
SnmpUtilMemReAlloc
SnmpSvcInitUptime
SnmpUtilUnicodeToUTF8
SnmpSvcGetUptime
SnmpUtilAsnAnyCpy
SnmpSvcGetEnterpriseOID
SnmpUtilOidNCmp
SnmpUtilOidCmp
SnmpUtilVarBindFree
SnmpUtilOidFree
SnmpUtilOidCpy
SnmpUtilVarBindCpy
SnmpUtilOctetsCpy
SnmpUtilVarBindListFree
SnmpUtilMemAlloc
SnmpUtilOctetsCmp
SnmpUtilOctetsFree
SnmpSvcSetLogLevel
SnmpSvcSetLogType
SnmpUtilMemFree
ws2_32
bind
htons
getservbyname
WSASocketA
ntohl
inet_addr
WSASendTo
WSAGetLastError
WSARecvFrom
WSAStartup
WSACleanup
WSAIoctl
closesocket
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ