Behavioral task
behavioral1
Sample
1612-152-0x0000000010590000-0x0000000010613000-memory.exe
Resource
win7-20230220-en
General
-
Target
1612-152-0x0000000010590000-0x0000000010613000-memory.dmp
-
Size
524KB
-
MD5
f69582c9afbbe2609a2e0501bb7940c6
-
SHA1
560ba9da026dc1462f2c1436977982cf1f613b34
-
SHA256
eaa6b7c6cf38b948061026ae9927c02ac332bbd5b3c8bf969d674e69fdf3b117
-
SHA512
e8f5033b561e550097450da59712e9f38f19319706960e601404367a172c46f25533040c1cf7bcfd847f80c0bfddfff5a35775a7164ff8816e98db579a30da25
-
SSDEEP
12288:FjdAK8wxqkXuxOqLXO3X2orpbKs/ZgUBRq:LA3wxqkXuxOq+rpbRZv
Malware Config
Signatures
-
Remcos family
Files
-
1612-152-0x0000000010590000-0x0000000010613000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.text Size: 478KB - Virtual size: 512KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE