Behavioral task
behavioral1
Sample
3612-141-0x0000000000400000-0x0000000000552000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3612-141-0x0000000000400000-0x0000000000552000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
3612-141-0x0000000000400000-0x0000000000552000-memory.dmp
-
Size
1.3MB
-
MD5
d2db1824bd5a193d377eeeacad7daca8
-
SHA1
f292b9aeb96ec32b079bfe476e78d974aa61a3da
-
SHA256
8582941c58dab282600c02ea6f13bc31d4bdfe074f7d2fc8fb402ef790afa85a
-
SHA512
52d007b078fc4e3dc49d24c28b13ec39ee105e4b1e3ee0ae9d92307de73c0f747ccbea5a33994379d16b486efe9d6da51d23819633ce4d2c79533a0b4145d90c
-
SSDEEP
24576:HdkH+O5MMsj/8oJ0HOgwzMIdEyaXC772Q9NXw2/wPOjdGxYC:HyHZ5MMpoJOp+MIVai7Tq24GjdGS
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://167.88.170.23/swo/sw.exe
http://167.88.170.23/swo/swo.exe
Signatures
-
Eternity family
Files
-
3612-141-0x0000000000400000-0x0000000000552000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ