Behavioral task
behavioral1
Sample
2788-166-0x0000000000400000-0x000000000045A000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2788-166-0x0000000000400000-0x000000000045A000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2788-166-0x0000000000400000-0x000000000045A000-memory.dmp
-
Size
360KB
-
MD5
c92282e8e8799ac2eb8a5ab1cc98d06f
-
SHA1
ae2f8bf92d58a432d1e5ba75a1f544904921a242
-
SHA256
50a4c1a79233ae4f75c5d9619fa111f8d407e8e999daa8831ad015e2e85d1b00
-
SHA512
c9c4c06abd4c826128a1259dfa5fc0ecdc8f52960399285538e8bd5ae4e3622b3ad1394f1677f93aa7cc2f4ebc7ca1c665d667bad0f0dd0343703fad7a4f60c0
-
SSDEEP
6144:gW/z9Ns6TbumkfuauSOqT9ajH4GuK2cTCbLEG8ENa654jEbD:gW/z9Ns6TbzjH4GuKPCHEw4j
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Signatures
-
Eternity family
Files
-
2788-166-0x0000000000400000-0x000000000045A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 335KB - Virtual size: 335KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ