Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Fragtor.185482.1949.26308.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Fragtor.185482.1949.26308.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Variant.Fragtor.185482.1949.26308.exe
-
Size
63KB
-
MD5
398a482b671ded2f63372f68d1175680
-
SHA1
831f76bf377400e4c057526c7d960baf2db71931
-
SHA256
8f72a0e10464b0a8aa54617f3ab1f1a1ac4e81c287349d31a7f5cd05b5c34e7a
-
SHA512
31da637f719a144b631154ba906c47da17b9011bbdf6b4328a145837a9e61dffacfb46c39860fb2ce2eea97b09d43d65e3c9b0936689f41b164ecc3452db910d
-
SSDEEP
768:5Dk4qGdTZNJ33dJx+3tusLlNq1TUz0tiVmqoRi+Q2wM8uU0XKHIVlJJV5:5DW8TZ/dD+3tnLlNq1T004ms+vwqtpb
Malware Config
Signatures
Files
-
SecuriteInfo.com.Variant.Fragtor.185482.1949.26308.exe.exe windows x86
bdbdbb079f7bad682466b4d9096ae647
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsSystemFolderA
StrCpyW
PathIsURLW
PathFindFileNameA
SHDeleteValueW
StrPBrkW
PathBuildRootA
PathStripToRootW
PathIsURLA
UrlUnescapeA
kernel32
GetThreadPriority
CreateDirectoryExW
FindNextFileA
SwitchToThread
GetPrivateProfileSectionA
HeapFree
GetProcessHeap
VirtualAlloc
Sleep
GetTickCount
GetConsoleWindow
GetCurrentProcessId
GetModuleHandleW
WriteFile
HeapAlloc
WideCharToMultiByte
GetOEMCP
WriteConsoleW
GetStdHandle
FormatMessageW
HeapReAlloc
CloseHandle
OpenProcess
TerminateProcess
GetConsoleAliasA
GetLocaleInfoA
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualFree
HeapCreate
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
VerLanguageNameW
FileTimeToDosDateTime
HeapSize
WriteConsoleA
GetConsoleOutputCP
SetEndOfFile
CreateFileA
lstrcmpW
LoadLibraryA
GetModuleFileNameA
GetProcAddress
ExitProcess
MultiByteToWideChar
GetLastError
ReadFile
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetStringTypeW
rtutils
MprSetupProtocolFree
RouterLogEventA
RouterLogRegisterW
LogErrorA
RouterLogRegisterA
mpr
WNetGetConnectionW
WNetOpenEnumW
WNetUseConnectionA
MultinetGetConnectionPerformanceA
WNetDisconnectDialog1A
WNetGetLastErrorW
WNetAddConnection3W
WNetGetUniversalNameW
WNetGetResourceInformationW
rpcrt4
I_RpcFreePipeBuffer
RpcProtseqVectorFreeW
NdrConformantVaryingArrayMemorySize
RpcStringBindingComposeW
RpcSsSwapClientAllocFree
RpcServerUseAllProtseqsEx
gdi32
GetTextExtentPointA
ExtEscape
GetGraphicsMode
GetTextMetricsW
SetWindowOrgEx
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
GetSaveFileNameW
GetOpenFileNameW
GetFileTitleW
FindTextA
user32
ShowWindow
GetWindowThreadProcessId
PostMessageW
LoadStringW
EnumWindows
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ