Static task
static1
Behavioral task
behavioral1
Sample
a6eb4ee74cbe3bf66fabe8fd62879a5cd413358d74dfe99152eddba39aff0fcf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6eb4ee74cbe3bf66fabe8fd62879a5cd413358d74dfe99152eddba39aff0fcf.exe
Resource
win10v2004-20220812-en
General
-
Target
a6eb4ee74cbe3bf66fabe8fd62879a5cd413358d74dfe99152eddba39aff0fcf
-
Size
110KB
-
MD5
4cd7e2415ce02cbf9480cce2816d1daf
-
SHA1
8c59c95359ac04637e341a3612ef3e36e23857ce
-
SHA256
a6eb4ee74cbe3bf66fabe8fd62879a5cd413358d74dfe99152eddba39aff0fcf
-
SHA512
4584497f3264af73bfeec63da9668c73a5dff92da81f4d48b899ad06867aeb9796a5421243e44d0b02bd154640b7774b51452fcbebbc9ce8cf8582cc18700794
-
SSDEEP
3072:Cl25mb9gbvldJi+kenCyDO6MW6WPMpk3d8v6:Cl255vldJfpqZwuSyi
Malware Config
Signatures
Files
-
a6eb4ee74cbe3bf66fabe8fd62879a5cd413358d74dfe99152eddba39aff0fcf.exe windows x86
e6535ae5e31a6fad5e14ad93130df8bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
FindClose
TlsGetValue
GetTickCount
CloseHandle
GetCommandLineA
GetComputerNameA
Sleep
GetLastError
GetExitCodeProcess
GetModuleHandleA
SearchPathA
GetDriveTypeA
CreateSemaphoreA
GetModuleFileNameA
DeleteCriticalSection
SetLastError
CreateMutexA
VirtualProtect
FreeConsole
shell32
SHGetMalloc
DragAcceptFiles
StrChrA
ShellAboutA
ShellMessageBoxA
DragQueryPoint
SHGetDiskFreeSpaceA
DragQueryFileA
SHFree
SHAlloc
DragFinish
SheChangeDirA
SHGetSettings
SHGetNewLinkInfo
mgmtapi
SnmpMgrRequest
SnmpMgrClose
SnmpMgrOpen
SnmpMgrGetTrap
SnmpMgrCtl
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ