Behavioral task
behavioral1
Sample
1252-56-0x0000000010000000-0x0000000010B6B000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1252-56-0x0000000010000000-0x0000000010B6B000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1252-56-0x0000000010000000-0x0000000010B6B000-memory.dmp
-
Size
11.4MB
-
MD5
edf9f0111a501bebb57abfc0830ad0c9
-
SHA1
12ac68f512ef17c6737da7306c91d13b9ec5636a
-
SHA256
1347ba1bca8a62397a91cf71b9f640b817772e8f2ce3a7d0ae88136ee774c904
-
SHA512
61adce14bc496288aca15487dd674fa1cf3030d33e92d167d6723020bc01cbdf0be9d3222084fc2d3504a2af5f4d0d828e93398cad159f5b624540e6d3e2eb9b
-
SSDEEP
196608:XGGb+HxmVUtsQrcAnh7VrVMf3ksPqmzcl+LG314Hujb7KgkYCbGNBmHTE:XG++RPwQ7BMfUON+2HBb
Malware Config
Extracted
systembc
89.22.236.225:4193
176.124.205.5:4193
Signatures
-
Systembc family
Files
-
1252-56-0x0000000010000000-0x0000000010B6B000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
*;>%1sXO Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
7rP!Ni:j Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
bkE<E2?8 Size: - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
8*7`Joyq Size: - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
0Ys'"rSd Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nUPwRZiK Size: 7.2MB - Virtual size: 7.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
$u!6XeN& Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
K)'tLNvc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ