Static task
static1
Behavioral task
behavioral1
Sample
a50737fac3737bd6fa27c34087a6a1b6bc318011c1c6c132010e755cc8fb75a2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a50737fac3737bd6fa27c34087a6a1b6bc318011c1c6c132010e755cc8fb75a2.exe
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
a50737fac3737bd6fa27c34087a6a1b6bc318011c1c6c132010e755cc8fb75a2.exe
Resource
win10v2004-20230220-en
General
-
Target
a50737fac3737bd6fa27c34087a6a1b6bc318011c1c6c132010e755cc8fb75a2
-
Size
1.3MB
-
MD5
c02702ca5a373d23d58c9934258bed40
-
SHA1
e397072eed5e0b3b7be5c08914db6aebcb5cac81
-
SHA256
a50737fac3737bd6fa27c34087a6a1b6bc318011c1c6c132010e755cc8fb75a2
-
SHA512
2a28a7c9248105eae2b81b984d9f1ba521af7ff1b425a23a86e4f9ee0691f02b9b9907fa79cdb77b27d44706a739d054e1346013f226233653342c39b5c83077
-
SSDEEP
24576:2CUAKMN3CY+qtrD+MciXrTPBWRO2Mi8qcuvcmvozNAvAUoQoXW5SXCTGD4h:L9N3d55x3XrTPIM2Mi86vcqOevA9W5Qs
Malware Config
Signatures
Files
-
a50737fac3737bd6fa27c34087a6a1b6bc318011c1c6c132010e755cc8fb75a2.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 855KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 12KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 483KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.petite Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE