Static task
static1
Behavioral task
behavioral1
Sample
c6dd623af7c0df705f52709f686753064755757ce3bb3d10955776ca35d990c1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6dd623af7c0df705f52709f686753064755757ce3bb3d10955776ca35d990c1.exe
Resource
win10v2004-20220901-en
General
-
Target
c6dd623af7c0df705f52709f686753064755757ce3bb3d10955776ca35d990c1
-
Size
102KB
-
MD5
600cc5f1133bf92ec22d8bc04a44dea3
-
SHA1
06adfca996796a6c3b4458ff3b06a40ab21b8428
-
SHA256
c6dd623af7c0df705f52709f686753064755757ce3bb3d10955776ca35d990c1
-
SHA512
6e5558da7da4199199ee8b6d76d4e254dd5ceb941f216fc2303aa8ab899414289f1fda1b5e4d993c9dba733263398528bd4276f593c7f3115d84f90cd579dc24
-
SSDEEP
3072:3woXzWIC6hz21ncxhIs3K1M9s0GTuV1HPUOW:AsCT1cxK0s0j9U
Malware Config
Signatures
Files
-
c6dd623af7c0df705f52709f686753064755757ce3bb3d10955776ca35d990c1.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdata Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
rwls Size: - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
wzhgvgy Size: - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
bodqsut Size: - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ