Static task
static1
Behavioral task
behavioral1
Sample
cd6efdf12c9c30ff1ab54ddbed992bc10803275506b0527eeeacea4dda48f471.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cd6efdf12c9c30ff1ab54ddbed992bc10803275506b0527eeeacea4dda48f471.exe
Resource
win10v2004-20220901-en
General
-
Target
cd6efdf12c9c30ff1ab54ddbed992bc10803275506b0527eeeacea4dda48f471
-
Size
20KB
-
MD5
a87e085c34bd027e14b165bb7aaa79a5
-
SHA1
7f0010700dbf366b6ab113d5a352bc49d190c9da
-
SHA256
cd6efdf12c9c30ff1ab54ddbed992bc10803275506b0527eeeacea4dda48f471
-
SHA512
11538e2e4f38ba9933eb6e1ca87673f34a849ec88ef7f768b173451d03de6441fe8a3230b34870db986af4d03c9b277f2f6db69e1731aacb23675cb95f7c7df2
-
SSDEEP
384:IJsiV09BWVnYTprmG9y9oHGoJ1KmI3T3Bwq/3SJPUlkxc8tBagZoo0HkVbc5ERFl:IJs209BWVnYTprHyOGoJ1KmI3T3Bwq/r
Malware Config
Signatures
Files
-
cd6efdf12c9c30ff1ab54ddbed992bc10803275506b0527eeeacea4dda48f471.exe windows x86
b46e6680c0595e8989d727f74f1ddc7f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp71
?_Nomemory@std@@YAXXZ
msvcr71
??3@YAXPAX@Z
_vsnprintf
strcmp
srand
memcpy
??_V@YAXPAX@Z
strchr
exit
sprintf
strtok
strncpy
malloc
strcpy
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
__CxxFrameHandler
strstr
strlen
rand
strcat
memset
_callnewh
kernel32
Sleep
GetModuleFileNameA
GetStartupInfoA
GetTickCount
LoadLibraryA
GetModuleHandleA
GetProcAddress
ExitProcess
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE