Behavioral task
behavioral1
Sample
1896-59-0x0000000000460000-0x0000000000466000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1896-59-0x0000000000460000-0x0000000000466000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1896-59-0x0000000000460000-0x0000000000466000-memory.dmp
-
Size
24KB
-
MD5
bafdb0f244fa8d65e7673159dd50d9f2
-
SHA1
6c8553d805817a73ac2a112c376d8de5b6a98a19
-
SHA256
043d5c9e4e549a8843d479663ab7058cbb6e16e15a64a07ecb718d6478fc3105
-
SHA512
9dc0ea86a1c0bf8a57fd1d209b306218c6a1bcdca664a51a848c31f081be3dc527cfa2dddaa3fd0de9649ab7dc1fa9494af3ad00e935e8ce7fc77838d9bee6c1
-
SSDEEP
96:kjcmL9/6QDnBBg+taheCy6/MM4odWLsO+ZuBFymmrgIshRsUHVJrBJV8zU2FFxgT:kjnL9/XBtaL/ZbdNPrgN/jjWrFFx8
Malware Config
Extracted
systembc
210.16.67.250:3000
192.168.1.28:3000
Signatures
-
Systembc family
Files
-
1896-59-0x0000000000460000-0x0000000000466000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ