Resubmissions

13/01/2023, 02:01

230113-cfl75shb5w 8

13/01/2023, 00:29

230113-asz9esff81 8

Analysis

  • max time kernel
    2s
  • max time network
    40s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2023, 00:29

Errors

Reason
platform exec: image=C:\Users\Admin\AppData\Local\Temp\FD Tool 3.8 (Bypassfrpfiles.com)\FD Tool 3.8 AsiaTelecom No.1 Call 18001037001\FD Tool 3.8 Cracked\.exe command="C:\Users\Admin\AppData\Local\Temp\FD Tool 3.8 (Bypassfrpfiles.com)\FD Tool 3.8 AsiaTelecom No.1 Call 18001037001\FD Tool 3.8 Cracked\.exe" wdir=C:\Users\Admin\AppData\Local\Temp\FD Tool 3.8 (Bypassfrpfiles.com)\FD Tool 3.8 AsiaTelecom No.1 Call 18001037001\FD Tool 3.8 Cracked Payload error: The %1 application cannot be run in Win32 mode.

General

  • Target

    FD Tool 3.8 (Bypassfrpfiles.com)/FD Tool 3.8 AsiaTelecom No.1 Call 18001037001/FD Tool 3.8 Cracked/.exe

  • Size

    52KB

  • MD5

    3cc500c9b0e4d476802d277353cb2c89

  • SHA1

    d37069bdbb1004c1a357b9bd27002406a3b26354

  • SHA256

    9e4ee267bf70fe0a43a1b994546186fd5ed6e384a7b8f905dfa81617dbef9ad8

  • SHA512

    f256d9c7e2b44177e40fb6273ff7f94d900dd9d1a7520cc9a19dd692e1705c8678a24971bdcc52b0c550d7b0103b3abc62f65d82c27f926f392b79402927e8f8

  • SSDEEP

    768:w4oBSDD5aKAIS55muoh/4uCClp62yksPL5ti2Au7Tu10j0Nh2pjm7XxBdDK3XXvr:8IDPAntuEl5tcub0zZ7tS19FDwo+Dq

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\FD Tool 3.8 (Bypassfrpfiles.com)\FD Tool 3.8 AsiaTelecom No.1 Call 18001037001\FD Tool 3.8 Cracked\.exe
    "C:\Users\Admin\AppData\Local\Temp\FD Tool 3.8 (Bypassfrpfiles.com)\FD Tool 3.8 AsiaTelecom No.1 Call 18001037001\FD Tool 3.8 Cracked\.exe"
    1⤵
      PID:2264

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2264-132-0x0000000000010000-0x000000000001D180-memory.dmp

            Filesize

            52KB