Static task
static1
Behavioral task
behavioral1
Sample
HELL-ESP-AIO.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HELL-ESP-AIO.exe
Resource
win10v2004-20230221-en
General
-
Target
HELL-ESP-AIO.exe
-
Size
6.3MB
-
MD5
7da0047549ab4c60f234d090125a7510
-
SHA1
5d043bda16c6fc0aeab4c8d85e4aa3dd4acbe315
-
SHA256
1e6143096a7b2d8e606ea0573b533f5cb8c8fb2c23298a0e620cdc9af9e1540d
-
SHA512
f5729df72cc9a926008ff9da111671a0958513dcede661718fcb6fe234fcfa0e765d1ba1640e5516c2c4110d372de8647bb0a33c375940d9255b14903a20f076
-
SSDEEP
98304:jkKZYPSHIIX1tuqY224i7FBs8CLShZ9AETQRPFHoHZYDF6XIfKuG:AKWPCXuqYCiQLQZ9AwQRPFHo56FeQ/G
Malware Config
Signatures
Files
-
HELL-ESP-AIO.exe.exe windows x64
e48b5782950d30d109c3f4c0356450bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LoadLibraryA
GetVersion
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
PostThreadMessageW
CharUpperBuffW
shell32
ShellExecuteW
msvcp140
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
ntdll
RtlLookupFunctionEntry
normaliz
IdnToAscii
wldap32
ord217
crypt32
CertFreeCertificateChain
ws2_32
freeaddrinfo
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_copy
api-ms-win-crt-string-l1-1-0
isupper
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
api-ms-win-crt-stdio-l1-1-0
ungetc
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-heap-l1-1-0
_callnewh
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-filesystem-l1-1-0
_fstat64
api-ms-win-crt-convert-l1-1-0
strtoll
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-math-l1-1-0
_dclass
advapi32
AddAccessAllowedAce
Sections
.text Size: - Virtual size: 454KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iH+ Size: - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Kd" Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.e7$ Size: 6.3MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ