Behavioral task
behavioral1
Sample
1508-144-0x0000000010000000-0x0000000010B6B000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1508-144-0x0000000010000000-0x0000000010B6B000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1508-144-0x0000000010000000-0x0000000010B6B000-memory.dmp
-
Size
2.1MB
-
MD5
1edd2baa17d5688319496fa455af4e7f
-
SHA1
4f2f131c4986b402e80f4bc0666c6c80fdab6da6
-
SHA256
1452facb5685f0ca10b0bc954fef88d7739e2fb7773c5b7701c47f6f82cebed2
-
SHA512
6b29aa4b98852375f41ff26561ee2239ec3ce7d3e5de8b30c6404e3e27e5ebd17cd5995ba4dcf48e389b2d2d7b12223b0b3af65f7792c95b754901339fcea1a6
-
SSDEEP
49152:mUSomvOjpWKzTOEpYMIR6Td3+odh4f/6lobWlHtiUw+ZM:mUSomvGbfjIA+or+ClobWKUwCM
Malware Config
Extracted
systembc
89.22.236.225:4193
176.124.205.5:4193
Signatures
-
Systembc family
Files
-
1508-144-0x0000000010000000-0x0000000010B6B000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
*;>%1sXO Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
7rP!Ni:j Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
bkE<E2?8 Size: - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
8*7`Joyq Size: - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
0Ys'"rSd Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nUPwRZiK Size: 7.2MB - Virtual size: 7.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
$u!6XeN& Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
K)'tLNvc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ