Behavioral task
behavioral1
Sample
69c0102b8e8c90082671e5b90369d26d3ea958cf1f98b072f05333da9cb59c52.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69c0102b8e8c90082671e5b90369d26d3ea958cf1f98b072f05333da9cb59c52.exe
Resource
win10v2004-20220812-en
General
-
Target
69c0102b8e8c90082671e5b90369d26d3ea958cf1f98b072f05333da9cb59c52
-
Size
524KB
-
MD5
2fdc8940fc7dd46ce9a4700a0bef55c0
-
SHA1
9f8db854522b02e9b34e365963198e6832cbeccf
-
SHA256
69c0102b8e8c90082671e5b90369d26d3ea958cf1f98b072f05333da9cb59c52
-
SHA512
8378a507d26e1730cdccf0d5ced5f490764bb18f5b97a1ad09f78682664963dd75ea83511d04e02e69d688066a63efbd92504d36b0530d8875e4479117d95bd4
-
SSDEEP
3072:4aJXeoDP+WgIEolqcpWpEY4p6NuLyWXAKcajLnoWO0yM:4Mu8mncpWHGZy2pH3noWO0y
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
Files
-
69c0102b8e8c90082671e5b90369d26d3ea958cf1f98b072f05333da9cb59c52.exe windows x86
717e2428ad1b9fb4a9329cd67ee2eafc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
inet_ntoa
htonl
WSACleanup
connect
send
socket
sendto
WSAStartup
recv
gethostname
gethostbyname
ioctlsocket
shutdown
closesocket
htons
gethostbyaddr
advapi32
GetUserNameA
user32
wsprintfA
CharLowerA
mpr
WNetAddConnection2A
shell32
ShellExecuteExA
SHChangeNotify
iphlpapi
GetAdaptersInfo
wininet
InternetReadFile
DeleteUrlCacheEntry
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
netapi32
NetLocalGroupAddMembers
NetUserAdd
mfc42
ord823
ord2764
ord4278
ord858
ord6874
ord540
ord860
ord800
ord825
msvcrt
_stricmp
memcmp
fread
ftell
fclose
fseek
fwrite
printf
fprintf
fgets
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
time
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
atol
rand
strchr
strrchr
strcpy
_except_handler3
strcmp
strstr
_snprintf
__CxxFrameHandler
ceil
strncat
_strcmpi
_ftol
sscanf
strtok
_vsnprintf
strlen
malloc
memset
memcpy
srand
strcat
strncpy
sprintf
__getmainargs
atoi
free
fopen
kernel32
WinExec
MultiByteToWideChar
LoadLibraryA
GetSystemDirectoryA
GetLocaleInfoA
CreateMutexA
SetFileAttributesA
GetStartupInfoA
CreateToolhelp32Snapshot
LocalFree
GetCurrentProcessId
Process32Next
lstrcpyA
QueryPerformanceFrequency
QueryPerformanceCounter
GetLogicalDriveStringsA
GetDriveTypeA
lstrcatA
CreateDirectoryA
lstrlenA
EnterCriticalSection
Process32First
GetCurrentThread
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteFileA
ReleaseMutex
TransactNamedPipe
ReadFile
CreateEventA
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
SetThreadPriority
SetProcessPriorityBoost
CopyFileA
GetWindowsDirectoryA
GetFileTime
SetFileTime
GetFileAttributesA
TerminateThread
OpenProcess
TerminateProcess
GetCurrentProcess
ExpandEnvironmentStringsA
CreateFileA
ExitThread
WriteFile
CreateProcessA
lstrcmpiA
CreateThread
Sleep
GetLastError
GetTickCount
GetTempPathA
WaitForSingleObject
CloseHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
ExitProcess
GetVersionExA
LocalAlloc
Sections
.text Size: 464KB - Virtual size: 464KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE