Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume2/Windows/Temp/BycnLHtm.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume2/Windows/Temp/BycnLHtm.exe
Resource
win10v2004-20221111-en
General
-
Target
machpanel1_2023-01-13_09_14_05 (1).zip
-
Size
1KB
-
MD5
4827f788e1890afc254eff488c3ba73e
-
SHA1
488023ac6c9437189bf3e38428d5064ee1b6223e
-
SHA256
3eb0582e925009877e0d34f77113da8feefed452c1504717ed52cf04134678b8
-
SHA512
bd94173438ec9b443f8a313e713959ff545553e1e54e88461b59551cb21bbb28d83c162938d48c260776bd10712dfbdf53f08a09c4c916f8e6667e6f2ce481e0
Malware Config
Signatures
Files
-
machpanel1_2023-01-13_09_14_05 (1).zip.zip
Password: Malware123!!
-
Device/HarddiskVolume2/Windows/Temp/BycnLHtm.exe.exe windows x64
Password: Malware123!!
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gqas Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
manifest.json