Behavioral task
behavioral1
Sample
PingSo9998.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PingSo9998.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
redmod.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
redmod.exe
Resource
win10v2004-20221111-en
General
-
Target
5a7e079529cda82e1db100fcd71e708fc261279c180dc0e9883faef1f3bdf726
-
Size
246KB
-
MD5
2c379324469bc15476a5afdb9a28748f
-
SHA1
726038166adc12e6b83a06d6216e7f13562763e3
-
SHA256
5a7e079529cda82e1db100fcd71e708fc261279c180dc0e9883faef1f3bdf726
-
SHA512
7686b28e3ded632ceca3b2128ecc99329195b3791bfad1326bc799b7d5c57604ede8aee87b55afa08612d216d5d8cff11fb011e58eafa067f4ad3786c757cd25
-
SSDEEP
6144:oKKCy63VymwbJtVW6WzfG9taKlvRFQhwkgBvxR1+FTXH1:x2KEDfU6W691HRvxRcLV
Malware Config
Signatures
-
resource yara_rule static1/unpack001/PingSo9998.exe upx
Files
-
5a7e079529cda82e1db100fcd71e708fc261279c180dc0e9883faef1f3bdf726.rar
-
PingSo9998.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 264KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 155KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 384KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
readme.txt
-
redmod.exe.exe windows x86
c967f3cf5a9e9672243248c01d36590b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
HeapAlloc
HeapFree
TerminateProcess
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileTime
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileSize
GetFileAttributesA
GetProfileStringA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
SetErrorMode
WritePrivateProfileStringA
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
SizeofResource
GetLastError
GlobalFlags
lstrcpynA
MulDiv
SetLastError
GlobalAlloc
lstrcmpA
GetCurrentThread
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
lstrlenA
MultiByteToWideChar
GetThreadLocale
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GetProcAddress
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
WriteProfileStringA
OpenProcess
GetSystemInfo
GetTickCount
VirtualQueryEx
ReadProcessMemory
VirtualProtectEx
WriteProcessMemory
CloseHandle
GetProfileIntA
GetModuleFileNameA
GetFileType
IsDebuggerPresent
user32
GetNextDlgGroupItem
MessageBeep
InflateRect
RegisterClipboardFormatA
CharUpperA
PostThreadMessageA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetClassNameA
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
GetDesktopWindow
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
EnableWindow
FindWindowA
PostMessageA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
IsWindowEnabled
InvalidateRect
UnregisterHotKey
GetWindowThreadProcessId
IsWindow
GetWindowRect
RegisterHotKey
SetTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
SetRect
CopyAcceleratorTableA
GetSysColorBrush
LoadCursorA
GetMenu
AppendMenuA
SendMessageA
DefDlgProcA
IsWindowUnicode
LoadIconA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
DestroyMenu
LoadStringA
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
SetCursor
PostQuitMessage
wvsprintfA
CharNextA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
CallWindowProcA
PtInRect
GetSubMenu
gdi32
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
SelectObject
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DPtoLP
LPtoDP
GetMapMode
PatBlt
RestoreDC
SaveDC
DeleteDC
GetStockObject
GetDeviceCaps
GetBkColor
GetTextColor
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
oledlg
ord8
ole32
OleUninitialize
OleInitialize
CoFreeUnusedLibraries
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
oleaut32
SysAllocString
SysFreeString
VariantChangeType
SysAllocStringLen
VariantTimeToSystemTime
VariantCopy
SysStringLen
SysAllocStringByteLen
VariantClear
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
unins000.dat