Static task
static1
Behavioral task
behavioral1
Sample
921949878d12d1f691362da70a50303778ab51d00a4c085f155e51859f61a37d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
921949878d12d1f691362da70a50303778ab51d00a4c085f155e51859f61a37d.exe
Resource
win10v2004-20221111-en
General
-
Target
921949878d12d1f691362da70a50303778ab51d00a4c085f155e51859f61a37d
-
Size
20KB
-
MD5
4115d3d82173671ec8229c99e83ad8b2
-
SHA1
a7bbfd887b2f8d56d381ebe26c6134ab1836e219
-
SHA256
921949878d12d1f691362da70a50303778ab51d00a4c085f155e51859f61a37d
-
SHA512
60a8839f2550fe789683c9a414ce127b8ee0ed42c8161824f8fef77ee9b4678eafe7a70e1ebba465e71851e52f558674e4b846bba6d04f9af5a3035bb3c8b900
-
SSDEEP
384:NGayJR7BemXE6z0yhBj4COZhtDddkL1q+kS:sdEjyTQdkL1q+
Malware Config
Signatures
Files
-
921949878d12d1f691362da70a50303778ab51d00a4c085f155e51859f61a37d.exe windows x86
d255f6e13ae324765cf5f8f383ea3ebd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
sendto
recvfrom
WSAStartup
setsockopt
socket
inet_addr
htons
connect
send
recv
getsockname
closesocket
shlwapi
StrStrIA
StrStrA
wnsprintfA
kernel32
UnmapViewOfFile
ReleaseMutex
WaitForSingleObject
GetCurrentThreadId
IsBadWritePtr
HeapFree
IsBadReadPtr
HeapReAlloc
HeapAlloc
HeapCreate
lstrlenW
Sleep
LocalFree
LocalAlloc
lstrlenA
GetTickCount
lstrcmpA
lstrcatA
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
CloseHandle
ExitProcess
lstrcpyA
WideCharToMultiByte
lstrcmpiA
GetProcAddress
LoadLibraryA
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
GetWindowsDirectoryA
advapi32
RegEnumKeyExA
RegEnumValueA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
shell32
SHGetFolderPathA
ole32
CreateStreamOnHGlobal
CoTaskMemFree
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE