Behavioral task
behavioral1
Sample
1900-142-0x0000000010000000-0x0000000010B6B000-memory.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1900-142-0x0000000010000000-0x0000000010B6B000-memory.dll
Resource
win10v2004-20220901-en
General
-
Target
1900-142-0x0000000010000000-0x0000000010B6B000-memory.dmp
-
Size
2.1MB
-
MD5
20d3611f21cee0d135b9c51db871a2bd
-
SHA1
469f0b2604612c69fc16b8efd6b24dd14037062c
-
SHA256
3b49d0793af0356c5fac9688a4ff3e15e8fd04537236ad48e9d75227a08b9768
-
SHA512
2a00ea73d34b6e707ea3453ed7b5841f23d985f39fe53d5a1b709d50205bfde3bb5ac76a6feff369e8fe6f2dc1ab68d722c5afb44f2e8b33cb91081bb39c0716
-
SSDEEP
49152:hF60mvOjpWKI5lEpYTqETr7Rd/tLyJe6OoY3lHt0UwIY:hF60mvGboLqGd/Be9OoY3MUwp
Malware Config
Extracted
systembc
89.22.236.225:4193
176.124.205.5:4193
Signatures
-
Systembc family
Files
-
1900-142-0x0000000010000000-0x0000000010B6B000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
*;>%1sXO Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
7rP!Ni:j Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
bkE<E2?8 Size: - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
8*7`Joyq Size: - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
0Ys'"rSd Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nUPwRZiK Size: 7.2MB - Virtual size: 7.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
$u!6XeN& Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
K)'tLNvc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ