Behavioral task
behavioral1
Sample
1116-54-0x0000000000020000-0x0000000000026000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1116-54-0x0000000000020000-0x0000000000026000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1116-54-0x0000000000020000-0x0000000000026000-memory.dmp
-
Size
24KB
-
MD5
ea8c451f311d79b99f21e1a883d2abe8
-
SHA1
dc5eeef6f8e37a76f450a291b8fb32725ab8ece0
-
SHA256
c99d0e7226ee58eae7a04cb2eeb78689e2829884fe817d138f48c8ed9ab2fe9f
-
SHA512
2902786d996ee7a16779aa708e6f3c306df08d98c6655d13fa91c9212d7996ddfb7e63c40340567a1327fc1855938748940a806749d772e82ddee70b96d83711
-
SSDEEP
96:icoCMNVnRhLBuANutaH/FMhh/MM4odWLwZADPFyLh/bPin4VZao2i4gh2ew:ZoLvduAsaNS/Zbdi4hNVZwi4ixw
Malware Config
Extracted
systembc
45.91.203.197:443
Signatures
-
Systembc family
Files
-
1116-54-0x0000000000020000-0x0000000000026000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ