Static task
static1
General
-
Target
rld-nfsp.exe
-
Size
8KB
-
MD5
c3b876e17d6c4b58333768ec79604a19
-
SHA1
4826fc762deb6ee0429de62afc4e4c2eea984a3c
-
SHA256
2b987215ffe6829ad1dfa283c6dc8de63da4b7d875da60ca67408fb9d21f0e77
-
SHA512
48f820281dcaec9a507615be2b26a1fcf8a68c6e5d1b00111cfd40c4bfe1c8503a07c9e6843a52d7c4681a5d65684ff80c30bbaf04e2b3ee24e5351245a30896
-
SSDEEP
48:OEPi8xCdq2pmL3L0Jacr6P0EC4/24kiRb4rP4lhbLHyJMUd1KZsZ2BxJt3G4MgbL:nPv0Ujg0uw4z4lcKZsZ23JtOPwl
Malware Config
Signatures
Files
-
rld-nfsp.exe.exe windows x86
db8514a2903fd590f9e52da16beab4fa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetModuleHandleA
ExitProcess
GetTickCount
msvcrt
rand
strlen
strncpy
user32
GetDlgItem
EnumWindows
SetWindowTextA
SendMessageA
EndDialog
SendDlgItemMessageA
GetWindowTextA
DialogBoxParamA
Sections
CODE Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ