Behavioral task
behavioral1
Sample
SynapseXCracked.exe
Resource
win10-20220901-en
General
-
Target
SynapseXCracked.exe
-
Size
46KB
-
MD5
8809226e42c92dc68736a715a98bc7e1
-
SHA1
ebe96f36e53b0fd3b2d102e748764229fe0b1387
-
SHA256
016e468dcb9c8b349ea88e51564c90414e6f9dbab669d4664160fd252d6c7709
-
SHA512
296a7a71a1373f936dd301890b32f00f5dbe0fae8b7e52657bc1ecf92cc317e0e046a7ec77c6ce23e3e9a468e2837367a0d74dc32dd57f42ebdff0355d42a3cf
-
SSDEEP
768:0Tf/dGAYt7RRHCOuZLLpXTjvKZKfgm3EhmsR:0TX2pRRHCbLpXTbF7EIs
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/869758722644250624/RXmyKRDD8oo2DW2avV8b-C6-SKCT0VfycPLDWPdptVh3MWm7wubyWIaAWUm7Yhfe-QDK
Signatures
-
Mercurialgrabber family
Files
-
SynapseXCracked.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ