Behavioral task
behavioral1
Sample
4072-138-0x0000000010410000-0x00000000107F4000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4072-138-0x0000000010410000-0x00000000107F4000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4072-138-0x0000000010410000-0x00000000107F4000-memory.dmp
-
Size
3.9MB
-
MD5
1b502e65de1e05ef7b5d9b0420b65fef
-
SHA1
033a68c2075a580ae79d0265b576a5e667c4d27f
-
SHA256
403d8af03d6303ce8b5dd5e971596097a3c1d87a4855ee353b09125332b86a08
-
SHA512
160bf91666fdd31f13ce6a46ce3fa330a932c58fadd7f3354975e1ac3cbaef5182fb8b8b5e6f2d3c7a95e79839cfaea0eafbde915be9ff22a23630f40f7099c3
-
SSDEEP
98304:67RKCUqvxgjL4GhDZb62wGfnf6BoMvMU3H:Ep2MGJl62wCyV
Malware Config
Extracted
bitrat
1.38
winery.nsupdate.info:5877
-
communication_password
e5ff7c52fb3501484ea7ca8641803415
-
tor_process
tor
Signatures
Files
-
4072-138-0x0000000010410000-0x00000000107F4000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE