Static task
static1
Behavioral task
behavioral1
Sample
6b121b6a62f968036e01f1ea4232861ccf5f81722d88caf1f1588cf039e1dcac.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6b121b6a62f968036e01f1ea4232861ccf5f81722d88caf1f1588cf039e1dcac.exe
Resource
win10v2004-20221111-en
General
-
Target
6b121b6a62f968036e01f1ea4232861ccf5f81722d88caf1f1588cf039e1dcac
-
Size
895KB
-
MD5
6b69f848bc079ac6db733de7c7fa242d
-
SHA1
9993b5a9ec9e9d8046e5a332da32081959a8fcbf
-
SHA256
6b121b6a62f968036e01f1ea4232861ccf5f81722d88caf1f1588cf039e1dcac
-
SHA512
f466d0ab41dbddc21af32558d5f5bee32f5b2ff8cdba5f6255345af464eeaf0876477a723604fc5ff9326d7291853290636784a23d24c97a691b8a89b5084944
-
SSDEEP
12288:t6zNf5qVFawTz3wJvZ6q/lLpGhZtenJF9lBzTB5q6CTvMVbpiHCKUoGk7amSY8Z4:FtTF9qaMjqA/7iijsOjZtXNxA0j+n9
Malware Config
Signatures
Files
-
6b121b6a62f968036e01f1ea4232861ccf5f81722d88caf1f1588cf039e1dcac.exe windows x86
2d82a442db27b2fe89bffae1664098d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetDriveTypeA
FlushFileBuffers
EnterCriticalSection
GetTickCount
CloseHandle
WriteFile
CreateFileA
GetTempPathA
GetModuleFileNameA
ReadFile
GetFileSize
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetStartupInfoA
msvcrt
sprintf
memset
strrchr
strcpy
strchr
strlen
??2@YAPAXI@Z
__CxxFrameHandler
strcmp
malloc
free
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
memcpy
??3@YAXPAX@Z
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ