Hai
Static task
static1
Behavioral task
behavioral1
Sample
56693b2363024dd47e0f13d4f93ddebc0bbf65b896eb22636641d03aad7bf8af.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
56693b2363024dd47e0f13d4f93ddebc0bbf65b896eb22636641d03aad7bf8af.exe
Resource
win10v2004-20230220-en
General
-
Target
56693b2363024dd47e0f13d4f93ddebc0bbf65b896eb22636641d03aad7bf8af.zip
-
Size
74KB
-
MD5
abeebb2b9d9237bb68317ca5ea6bda50
-
SHA1
47984e7eb6434f14f88c1b7b44faf81df3d3c9ed
-
SHA256
03e2c418cb3172abe01433d974f3204dda1f54377b0c54a30ca96f82c2d6309a
-
SHA512
1500cbda96127d995a311ec99eaf961e30b294d9c0d31f9e7cb83ae439c0eb8f82982debb6de2a531ab3a5b96bc2d7c898a5bada4a9112356f37f46883961bd3
-
SSDEEP
1536:91pUNKWkN/+isVVWD+pnv0erO1Fkjg4WciEhnVZxBSnaZUD0skbg:91KoV8XWDpjgBWvUQn/b
Malware Config
Signatures
Files
-
56693b2363024dd47e0f13d4f93ddebc0bbf65b896eb22636641d03aad7bf8af.zip.zip
Password: infected
-
56693b2363024dd47e0f13d4f93ddebc0bbf65b896eb22636641d03aad7bf8af.exe.exe windows x86
Password: infected
042c3e0dabd645f5ceb44bd41cdd4002
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
VirtualAlloc
Sleep
VirtualProtect
VirtualFree
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
FreeLibrary
GetLastError
RaiseException
InterlockedExchange
LocalAlloc
GetStartupInfoA
GetModuleHandleA
msvcrt
exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_XcptFilter
_exit
??2@YAPAXI@Z
free
realloc
??3@YAXPAX@Z
_acmdln
_stricmp
Exports
Exports
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ