Static task
static1
Behavioral task
behavioral1
Sample
f4c5a213940cc56837626cc21efa7c17a2cc2177c1ecf247b202b10bad7cba50.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4c5a213940cc56837626cc21efa7c17a2cc2177c1ecf247b202b10bad7cba50.exe
Resource
win10v2004-20220812-en
General
-
Target
f4c5a213940cc56837626cc21efa7c17a2cc2177c1ecf247b202b10bad7cba50
-
Size
28KB
-
MD5
95cab614cb30f6de8c975dde7d35663c
-
SHA1
907cdf392c699bfb3eba95cdaa36a3ed6bc79896
-
SHA256
f4c5a213940cc56837626cc21efa7c17a2cc2177c1ecf247b202b10bad7cba50
-
SHA512
c2c48f52871428cbbc9194daefa0d4b207955da24c52d0317849a6c7ad1cba5199aa1346dffb761b6920d358658b1f5998b197bcf39f9e60b2d6adabadf27ea1
-
SSDEEP
384:EFdoqnmueTeNwjQGiqFX7/uJbdaapyAGYIw1Ev:WoqqeNwj7iqFX4x0R
Malware Config
Signatures
Files
-
f4c5a213940cc56837626cc21efa7c17a2cc2177c1ecf247b202b10bad7cba50.exe windows x86
58b659c22db64e33d336d198de4c390c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
AllocConsole
ExitProcess
FindAtomA
GetAtomNameA
SetUnhandledExceptionFilter
msvcrt
_sleep
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
ctime
exit
fclose
fflush
fopen
fprintf
fputc
fputs
fread
free
fseek
ftell
malloc
memcpy
memset
perror
signal
strcat
strcpy
strlen
strncat
time
user32
FindWindowA
GetAsyncKeyState
ShowWindow
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
recv
send
socket
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 176B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE