Static task
static1
General
-
Target
rld-da2k.exe
-
Size
8KB
-
MD5
b23f0b66fbad52cbefb38b64ad2a4823
-
SHA1
78e42fdde2aa1618b44572701676994e5ffb3115
-
SHA256
f7328b1ceb07b882794164d8da04f50ad043acf26d1006873fd36b85dbd5b8a2
-
SHA512
ff862848934868908a5106cc8a00d3dd0df395489841e15bb9b23dd03fcec1173bb7ab01cb4aaa9418e1d94de219bf19eb302c367270844dc154bfb70c9f1653
-
SSDEEP
48:OEPihrMpVXv2pmL3L0Jacr6P0EC4/24kixRr2rV9bqId1kZsZ2BxJt3G4MgnDuEh:nPixwhjg0ue0hTkZsZ23JtOXy
Malware Config
Signatures
Files
-
rld-da2k.exe.exe windows x86
db8514a2903fd590f9e52da16beab4fa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetModuleHandleA
ExitProcess
GetTickCount
msvcrt
rand
strlen
strncpy
user32
GetDlgItem
EnumWindows
SetWindowTextA
SendMessageA
EndDialog
SendDlgItemMessageA
GetWindowTextA
DialogBoxParamA
Sections
CODE Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ