Static task
static1
Behavioral task
behavioral1
Sample
a6688a954654ca8922802bb387ea2d733a3597141c9b90918025e4e1dac3f17f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a6688a954654ca8922802bb387ea2d733a3597141c9b90918025e4e1dac3f17f.exe
Resource
win10v2004-20220901-en
General
-
Target
a6688a954654ca8922802bb387ea2d733a3597141c9b90918025e4e1dac3f17f
-
Size
43KB
-
MD5
3092e63baf8f513470f41f4d8f8c61d5
-
SHA1
e620862d4dca2daedb3b00c2e2cd983cca1c238c
-
SHA256
a6688a954654ca8922802bb387ea2d733a3597141c9b90918025e4e1dac3f17f
-
SHA512
317f6b8f61e755641859d777323e4833f2b67b275b8a6a16831310a86af8af363ef9cdb52e53d5c7df0728508724c532969089401f83938cab513c8412c46cbc
-
SSDEEP
768:59rX1QKF30QmbB5rd7SaFCLmhdGXpgRA/K7mS3UsXdp5:5ZXNEhV5rdGaFtTGX2H35
Malware Config
Signatures
Files
-
a6688a954654ca8922802bb387ea2d733a3597141c9b90918025e4e1dac3f17f.exe windows x86
6efdf60df3e294438a907f9bdf3f9442
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateThread
DeviceIoControl
ExitProcess
GetCurrentDirectoryA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetTickCount
GetVersionExA
IsDebuggerPresent
ReadFile
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WriteFile
wsock32
gethostbyname
WSAStartup
WSACleanup
user32
MessageBoxA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 778B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE