Behavioral task
behavioral1
Sample
1240-54-0x0000000000400000-0x000000000094E000-memory.exe
Resource
win7-20230220-en
General
-
Target
1240-54-0x0000000000400000-0x000000000094E000-memory.dmp
-
Size
5.3MB
-
MD5
40560f7a821efbc9f4a3c3e61322e2af
-
SHA1
48c743eedc80ca03a6c455477bc1f1e8567fc67d
-
SHA256
e8743ff07230f004bd6b39aa2cc01d49918b09f63268eb397e34549496e0b249
-
SHA512
6396b7784e50b2096ead1491ae0340e0f6a6674f6651bc28009c32ee80e7921ee52f8b7b18c3dba16161587e61cf64516be7a23f87acfbe93d8d77b28d578e73
-
SSDEEP
98304:Uj9YYO4CrXY9HpBlwBvEYvGsLHrI21tjFHpojkI:brXY9JBovEALHrIUJXI
Malware Config
Extracted
systembc
45.15.156.213:4277
192.168.1.28:4277
Signatures
Files
-
1240-54-0x0000000000400000-0x000000000094E000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vm_sec Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ