Static task
static1
Behavioral task
behavioral1
Sample
b6e69cdd88b462c31d868fc30cb825f9bdbdf1daeacd8c3c8e50ef463e72dc25.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6e69cdd88b462c31d868fc30cb825f9bdbdf1daeacd8c3c8e50ef463e72dc25.exe
Resource
win10v2004-20220812-en
General
-
Target
b6e69cdd88b462c31d868fc30cb825f9bdbdf1daeacd8c3c8e50ef463e72dc25
-
Size
748KB
-
MD5
5c1097e9cea487d120170fcd8a7f351c
-
SHA1
11695123ed88d842c0c131b193a948b2662d8ff6
-
SHA256
b6e69cdd88b462c31d868fc30cb825f9bdbdf1daeacd8c3c8e50ef463e72dc25
-
SHA512
6f3d0b27e6757981c149d09507bbef03919370e9655c57a3bd52a217906fb8e0c52c1006b24da9110b4604b385534c230ab2fc0298f5f37f30bb11bb793a3082
-
SSDEEP
12288:JdbYDpyiBgGq0znxx0lFkGimgv0fvkOEkr+8/ur5wyIk8UDbTh:J8nDzxK7xXbEmZuWHwbh
Malware Config
Signatures
Files
-
b6e69cdd88b462c31d868fc30cb825f9bdbdf1daeacd8c3c8e50ef463e72dc25.exe windows x86
4de0b11c56a64699c5ed72d2120fd6c4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
IsBadWritePtr
ExitThread
AddAtomW
CloseHandle
GetCommandLineA
GetDriveTypeA
CreateDirectoryA
WriteFile
GetVersion
CreatePipe
GetModuleFileNameA
FindClose
CreateSemaphoreW
GetFileType
FindAtomA
SetVolumeLabelA
RemoveDirectoryA
WaitForMultipleObjects
HeapFree
RemoveDirectoryA
GetTapeStatus
DeleteAtom
SetEndOfFile
GetModuleHandleA
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
odbcbcp
bcp_bind
bcp_bind
bcp_bind
bcp_bind
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE