Static task
static1
Behavioral task
behavioral1
Sample
e60bb4c4444013651a3677d16ee14189a7643cb5eb94f47d0ecba8aade4b360a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e60bb4c4444013651a3677d16ee14189a7643cb5eb94f47d0ecba8aade4b360a.exe
Resource
win10v2004-20221111-en
General
-
Target
e60bb4c4444013651a3677d16ee14189a7643cb5eb94f47d0ecba8aade4b360a
-
Size
247KB
-
MD5
8bc7134c6beabe6d8fc704c7ba2c92a4
-
SHA1
0068c79ba2d55f3858b88b1d980a51d78f6bbe93
-
SHA256
e60bb4c4444013651a3677d16ee14189a7643cb5eb94f47d0ecba8aade4b360a
-
SHA512
0a322ec8e6a849d3eb471f0ad0c9c2c1db40ef2757a328921c9dcb1cc6a865089c511ee5cb01ed6c3549702e9a9c2f177da42a9e0641e0088ebf7ab7caccc3b2
-
SSDEEP
6144:fYtzlr63MEUEAcj4TyQOI5JgpcvqNplcBLPV8p:fYtzV68OAcMT0Iw5pULPmp
Malware Config
Signatures
Files
-
e60bb4c4444013651a3677d16ee14189a7643cb5eb94f47d0ecba8aade4b360a.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 60KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 131KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE