Static task
static1
Behavioral task
behavioral1
Sample
459d1c21798499ff47b010384de0bdc80d73d4bc69a43091b8430bde7c5be25a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
459d1c21798499ff47b010384de0bdc80d73d4bc69a43091b8430bde7c5be25a.exe
Resource
win10v2004-20220812-en
General
-
Target
459d1c21798499ff47b010384de0bdc80d73d4bc69a43091b8430bde7c5be25a
-
Size
4.6MB
-
MD5
013052b25d649a010818d4aaff675ed0
-
SHA1
ca01cc94f08018d9f8cfb1daa633fad60f4f546e
-
SHA256
459d1c21798499ff47b010384de0bdc80d73d4bc69a43091b8430bde7c5be25a
-
SHA512
c0e3b4ef8c6f9ca8c942615b1d7b74d0db92d2e8eeae11adf3d083d06b36449b922771f298a8516be84576dc66772866dede83a834389d6667430416a76ad028
-
SSDEEP
98304:+EleyOb5U9/N/pGiUS3l96sirRvnuiZ7ljcGvEhkXwHllK6:WNb5U9l/pGivlWv9ZRjcGEMIllK6
Malware Config
Signatures
Files
-
459d1c21798499ff47b010384de0bdc80d73d4bc69a43091b8430bde7c5be25a.exe windows x86
f009178c64d7ce5cf17ca374dfd2105d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
winmm
midiStreamRestart
ws2_32
WSACleanup
kernel32
GetProfileStringA
user32
GetDlgItem
gdi32
RectVisible
winspool.drv
OpenPrinterA
advapi32
RegQueryValueA
shell32
Shell_NotifyIconA
ole32
CoCreateInstance
oleaut32
SafeArrayAccessData
comctl32
ImageList_Destroy
wininet
InternetCloseHandle
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 3.4MB - Virtual size: 9.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1016KB - Virtual size: 1016KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ