Static task
static1
Behavioral task
behavioral1
Sample
ac4b9c201f5ed8ec66ce0181075feaef57bfd6454765155cdeaa56f05f871a3d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ac4b9c201f5ed8ec66ce0181075feaef57bfd6454765155cdeaa56f05f871a3d.exe
Resource
win10v2004-20221111-en
General
-
Target
ac4b9c201f5ed8ec66ce0181075feaef57bfd6454765155cdeaa56f05f871a3d
-
Size
704KB
-
MD5
4110d8341f21bdb3fc04fcb3818976f5
-
SHA1
2ed16d7716a363b1d5ab17fbe5cbbae1854f2605
-
SHA256
ac4b9c201f5ed8ec66ce0181075feaef57bfd6454765155cdeaa56f05f871a3d
-
SHA512
9ce6d50564c0ff58bf06dbc48a5d04f3fabc9a76a1047b68e90edfd94a70988105da17789dbd66d1dde0f671303500e425eaaf1bef92da2e8dc0435db58b2e43
-
SSDEEP
12288:H3jOn2k7T+CMPW5A4X4tbAYRrYJAeZ1sugXKyAt8wGpB5NPuvubQdGUmAShh:H3i2Q+C8W5AyYDrYhi3KyAt8wJvmQ8
Malware Config
Signatures
Files
-
ac4b9c201f5ed8ec66ce0181075feaef57bfd6454765155cdeaa56f05f871a3d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 556KB - Virtual size: 556KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mackt Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE