Static task
static1
Behavioral task
behavioral1
Sample
c5b66c543162a088ccbe04b50231c48b1d77d655b79f87a4faf0b36cb5b45e40.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5b66c543162a088ccbe04b50231c48b1d77d655b79f87a4faf0b36cb5b45e40.exe
Resource
win10v2004-20220901-en
General
-
Target
c5b66c543162a088ccbe04b50231c48b1d77d655b79f87a4faf0b36cb5b45e40
-
Size
480KB
-
MD5
b81caf2a1e09dafd9c30589781f8d50e
-
SHA1
3c814269eeca982c74f1f89e455a592d68f3b561
-
SHA256
c5b66c543162a088ccbe04b50231c48b1d77d655b79f87a4faf0b36cb5b45e40
-
SHA512
21d8f96dd65ac9968eadfc37388a9d9a0db80755504223ac262d191046c7bb52fe22916d8d6ed3bf9e96e4d4b9e2d044c7509c3253b5791298d2a92fa735d3ef
-
SSDEEP
6144:frg/BNHfYs/IyzL/u+WhP1Q0gC8IDpjPv6WeT:Tg/BRtAyzL/4tRJzjadT
Malware Config
Signatures
Files
-
c5b66c543162a088ccbe04b50231c48b1d77d655b79f87a4faf0b36cb5b45e40.exe windows x86
642f331c74fd40e556c4907a6e852466
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
packet
PacketSetBuff
PacketSetReadTimeout
PacketReceivePacket
PacketGetNetInfoEx
PacketFreePacket
PacketGetVersion
PacketOpenAdapter
PacketGetAdapterNames
PacketSetHwFilter
PacketCloseAdapter
PacketAllocatePacket
PacketRequest
PacketSendPacket
PacketInitPacket
iphlpapi
GetIpForwardTable
SendARP
mfc71
ord1617
ord3946
ord1402
ord4244
ord5152
ord1908
ord5073
ord6275
ord4185
ord5214
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord2991
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4261
ord3195
ord572
ord620
ord1968
ord2264
ord3641
ord3441
ord5182
ord4212
ord4735
ord4890
ord2020
ord1671
ord1670
ord1551
ord5912
ord1401
ord5203
ord4262
ord605
ord354
ord1794
ord5807
ord4580
ord2662
ord4541
ord3683
ord628
ord587
ord5975
ord1122
ord3830
ord1054
ord2248
ord757
ord4038
ord4014
ord6278
ord3801
ord1620
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord3333
ord566
ord3182
ord673
ord4042
ord438
ord5833
ord1263
ord1084
ord2371
ord1903
ord2086
ord1545
ord4232
ord3164
ord1063
ord378
ord6090
ord4749
ord709
ord501
ord3934
ord1532
ord557
ord6305
ord6306
ord3389
ord4109
ord2902
ord5563
ord6180
ord907
ord3997
ord1207
ord1024
ord3109
ord3110
ord1248
ord2566
ord2657
ord4035
ord559
ord1123
ord2468
ord5419
ord1258
ord5715
ord2346
ord1580
ord1247
ord3255
ord5331
ord6297
ord5320
ord6286
ord266
ord265
ord1249
ord3651
ord2092
ord1641
ord1571
ord4238
ord3230
ord658
ord651
ord3401
ord5866
ord5746
ord5871
ord2866
ord6006
ord2368
ord4125
ord2372
ord2370
ord3879
ord416
ord2271
ord2794
ord1565
ord2495
ord1930
ord5873
ord2882
ord3761
ord3875
ord6067
ord4353
ord3161
ord2095
ord1591
ord4240
ord3317
ord741
ord5915
ord1554
ord1280
ord3163
ord1934
ord3210
ord3684
ord784
ord2322
ord762
ord1185
ord310
ord1482
ord304
ord876
ord781
ord297
ord578
ord745
ord1187
ord747
ord3174
ord764
ord912
ord6276
ord5529
msvcr71
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
__security_error_handler
memset
_ismbblead
atoi
ceil
memmove
_resetstkoflw
strtoul
strtod
time
srand
rand
malloc
free
??0exception@@QAE@ABV0@@Z
_CxxThrowException
_time64
_except_handler3
__CxxFrameHandler
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_XcptFilter
_exit
_c_exit
_setmbcp
kernel32
GetLocaleInfoA
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
ExitProcess
GetThreadLocale
GetVersionExA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
SetEvent
ResetEvent
Sleep
CreateDirectoryA
GetModuleFileNameA
lstrlenA
InitializeCriticalSection
GetACP
user32
EnableWindow
DrawIcon
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
IsWindowVisible
LoadIconA
GetClientRect
CopyRect
LockWindowUpdate
RedrawWindow
GetParent
GetSysColor
SetWindowLongA
GetWindowLongA
SetTimer
GetSystemMetrics
gdi32
CreateSolidBrush
shell32
Shell_NotifyIconA
ShellExecuteA
comctl32
ord17
oleaut32
VarDateFromStr
ws2_32
ntohl
htonl
ntohs
WSAStartup
inet_ntoa
gethostbyaddr
inet_addr
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE