Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKD.46655478.31364.29064.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.GenericKD.46655478.31364.29064.exe
Resource
win10v2004-20221111-en
General
-
Target
SecuriteInfo.com.Trojan.GenericKD.46655478.31364.29064.exe
-
Size
229KB
-
MD5
69e97ebdcced34992da4835a7cd0c4df
-
SHA1
1894fe710d7d5160089ffc6f0e321703d5be6e6b
-
SHA256
52fe4a20faf9e131ea9f563fcce6baa00169c0b62ac243de400200020758e76d
-
SHA512
08162055a1b58966e11269f617a0bbada439c3b803f868fbeffa5f37b40c9d5c735bd0a6daa3ef398aef70a1cbf2a3ae0518ff8045b4491bc1d640a49f2a61c4
-
SSDEEP
3072:YvnA8m5RBS26d1AcgZQoDAyEstEPrZScA+jB8jG7SvVJsAmBvh2PHEMnwX3Go5gY:oPb26dufHDkwEPNScAsBveNQcGC3I
Malware Config
Signatures
Files
-
SecuriteInfo.com.Trojan.GenericKD.46655478.31364.29064.exe.exe windows x86
d2bff9423937b15e518b0d5c38cad8ba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetKeyboardState
CreateDesktopA
SetClipboardViewer
InSendMessage
gdi32
SetBitmapDimensionEx
CloseEnhMetaFile
SetTextCharacterExtra
SetPixel
urlmon
CopyStgMedium
CoInternetGetSecurityUrl
URLOpenPullStreamW
HlinkNavigateString
msvfw32
ICInfo
ICImageCompress
ICImageDecompress
ord2
ICCompressorChoose
ICClose
avifil32
AVIFileOpenA
AVIStreamFindSample
ws2_32
select
socket
getservbyport
getsockname
rpcrt4
NdrConformantStringMemorySize
NdrClearOutParameters
I_RpcBindingToStaticStringBindingW
RpcCancelThread
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 998B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ