Static task
static1
Behavioral task
behavioral1
Sample
e087f4ac3f9ccb36c669bc50b280f2c3964057b209c5a92199f42663ba614fe5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e087f4ac3f9ccb36c669bc50b280f2c3964057b209c5a92199f42663ba614fe5.exe
Resource
win10v2004-20221111-en
General
-
Target
e087f4ac3f9ccb36c669bc50b280f2c3964057b209c5a92199f42663ba614fe5
-
Size
1.3MB
-
MD5
14277c8efd13590a95c48ff8da0ff8b3
-
SHA1
d48829dd4b3f1c8383a411c7db0653c22f47125c
-
SHA256
e087f4ac3f9ccb36c669bc50b280f2c3964057b209c5a92199f42663ba614fe5
-
SHA512
07abe8d63770013e4f5aa001a9808cd7b15f37d5ed84f32d68c027e9d03bad60de327d403b15e214b58e10dea5abbcb9ae33a7d7d3a33d564a79ddb0a10a059b
-
SSDEEP
24576:j6keeZ0ul2SbasyzqB/8eT4wUB+lVSgln6R3nbNAHfHTr/A4X84BtY1Qli7rAIuq:zZdwSOsyzqBL1UMnl6R3+33d07rh
Malware Config
Signatures
Files
-
e087f4ac3f9ccb36c669bc50b280f2c3964057b209c5a92199f42663ba614fe5.exe windows x86
3ce8605f4572d09027ece14b34fde472
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
VirtualFree
Sections
Size: 667KB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 748KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qjepcjqa Size: 568KB - Virtual size: 568KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gtagjacd Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx Size: 28B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE