Behavioral task
behavioral1
Sample
dd1c3b5c33e87b269f1c88881c4f8f3b80dbe2175dc8e0573bc1e406c6d9b9e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd1c3b5c33e87b269f1c88881c4f8f3b80dbe2175dc8e0573bc1e406c6d9b9e3.exe
Resource
win10v2004-20220812-en
General
-
Target
dd1c3b5c33e87b269f1c88881c4f8f3b80dbe2175dc8e0573bc1e406c6d9b9e3
-
Size
756KB
-
MD5
50f820fe61127ba0df26a5b929fa3be1
-
SHA1
076534486de3b87715956e45a1980d16798e84b0
-
SHA256
dd1c3b5c33e87b269f1c88881c4f8f3b80dbe2175dc8e0573bc1e406c6d9b9e3
-
SHA512
96b13738f12fb001868e11895240786aa93e5f50676e1ff309a498fcc071ac30596f15c5bae863d523e25696b6bb262da7f5f20a84134b43dddb3906807ec9d8
-
SSDEEP
12288:0r5eGWQG7ocxHSvrlAxnQktIIK6Pf/pyAdzmGkgXDhyx73/CcjIbOmhSjz9hp:0rtcxHSvrmQktIfqfgAdzmGBXDgnj0Hi
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
Files
-
dd1c3b5c33e87b269f1c88881c4f8f3b80dbe2175dc8e0573bc1e406c6d9b9e3.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 376KB - Virtual size: 376KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
83fae12q Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dsjvved0 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
n8s4jaso Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
8xye6kbl Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pihz8k2n Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE