Behavioral task
behavioral1
Sample
3740-162-0x0000000010590000-0x0000000010612000-memory.exe
Resource
win7-20221111-en
General
-
Target
3740-162-0x0000000010590000-0x0000000010612000-memory.dmp
-
Size
520KB
-
MD5
a451ab985003d97ad0d011e6190b9631
-
SHA1
0d61c1eebf612da45241cf0d594c5f92a3a899b8
-
SHA256
7ca57804026ce2068de5c4be212e273e86dcfa5de41d53214dfd190aa0e859dc
-
SHA512
5faedb7659d39d3c3e73dd6016dbae1c92fd98b8e24fb8c5fa08510be99a725e6f22109e9544bf085ac0e80c1132d2c650e0a8dda8692bc02899f50a8b2c7247
-
SSDEEP
6144:obdjQFiTrgVohW1ydxCrLkE7ZFCSq1zeH4L5WIMOHsAOZZL1XBcYJ4:obdUYCohW1kMfkEbCSqxeYdsfZLB4
Malware Config
Signatures
-
Remcos family
Files
-
3740-162-0x0000000010590000-0x0000000010612000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 474KB - Virtual size: 508KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE