Static task
static1
General
-
Target
5579c0c355948a42082a952d9cc47c378b6c4ba51f8e0a3f449364076b1d9df8
-
Size
250KB
-
MD5
b3b025b8445dcbd9b7aca560ad752b74
-
SHA1
eda8da63b902f556e0940e7717d43dcad545857f
-
SHA256
5579c0c355948a42082a952d9cc47c378b6c4ba51f8e0a3f449364076b1d9df8
-
SHA512
70eb0ff2a1c4c36a33918f77225c631e08d05f564a577998ff7f63ea3387c4f08da5f5ff3edda649123826dcc96ad7dd82cb5b4f8736583b8a7f29a01a8f6a00
-
SSDEEP
3072:IX3m3VPLMTnriw5NqaR47ACQK0f1AMlRmxm6LrjFCVjIUa2gvoexNzu3K5+a:cHOVgCN0/l0xm6LrcVjIUapwS+K0a
Malware Config
Signatures
Files
-
5579c0c355948a42082a952d9cc47c378b6c4ba51f8e0a3f449364076b1d9df8.exe windows x86
acaf4fdcee39e74e99f51482171ebbd8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetSystemWindowsDirectoryA
GlobalUnlock
FindFirstVolumeMountPointW
CreateDirectoryExA
ZombifyActCtx
GetLogicalDriveStringsA
ReadConsoleInputA
GetComputerNameExW
GetTempPathA
GetCurrentDirectoryW
DebugBreak
LCMapStringA
GetProcAddress
GlobalAlloc
GetBinaryTypeA
IsDebuggerPresent
VerifyVersionInfoA
FindActCtxSectionStringW
UnhandledExceptionFilter
LocalFlags
GetLastError
GetConsoleAliasW
CreateNamedPipeA
GlobalFlags
GetModuleHandleA
CopyFileW
CreateActCtxW
lstrlenA
TlsGetValue
CreateActCtxA
DeleteVolumeMountPointA
GetTickCount
MoveFileWithProgressA
CreateMailslotW
WriteConsoleInputW
InterlockedExchangeAdd
EnumTimeFormatsW
VerifyVersionInfoW
FindNextFileW
FreeEnvironmentStringsW
WriteConsoleW
GetProcessPriorityBoost
CreateFileW
GetNumberOfConsoleInputEvents
GetConsoleTitleA
LoadLibraryW
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
HeapFree
SetUnhandledExceptionFilter
DeleteFileA
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
CloseHandle
HeapAlloc
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
Sleep
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
RaiseException
WriteConsoleA
GetConsoleOutputCP
user32
GetMenuInfo
GetMessageExtraInfo
gdi32
GetCharWidth32A
GetColorAdjustment
GetBrushOrgEx
advapi32
SetThreadToken
Sections
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 39.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ