Static task
static1
Behavioral task
behavioral1
Sample
SENDWORM.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SENDWORM.exe
Resource
win10v2004-20221111-en
General
-
Target
f2d06bdc67e73973c9dc8fedf8be9fc597de4f0285b69efaba48ac4e8273d8ad
-
Size
10KB
-
MD5
c8547d11974a2fd323f8147abd17ad02
-
SHA1
98423ef68d7f5f4593efa2e5148662741eca0a9b
-
SHA256
f2d06bdc67e73973c9dc8fedf8be9fc597de4f0285b69efaba48ac4e8273d8ad
-
SHA512
ea546679395963d8fc0dff81615b939d0e50b33b03def852ee7d5fe5dc59fb77b0be8f65f11b5aa0397efa7d3d38aa0c509c5a852328557252f17d8a51d910b0
-
SSDEEP
192:+PsFkYqLhxGD8fu3DOEtjkFqZY8Hws3IoQw2kxuqu2qFJm17Z107CyePMWblfPVr:UkgfUDOE9818HZ3VZVN917Zu+yPWbl39
Malware Config
Signatures
Files
-
f2d06bdc67e73973c9dc8fedf8be9fc597de4f0285b69efaba48ac4e8273d8ad.zip
-
FINDK32.INC
-
MAKEFILE
-
SENDWORM.EXE.exe windows x86
ee9c9a3024a46ccd2f738bb44c67d8d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrlenA
WriteFile
GetStdHandle
ExitProcess
GetCommandLineA
wsock32
socket
recv
WSACleanup
inet_addr
gethostbyname
connect
send
closesocket
WSAStartup
user32
wsprintfA
Sections
CODE Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
WORM.EML.eml
-
WORM.INC