Static task
static1
Behavioral task
behavioral1
Sample
4456fadc9f77026465540025933022161dd0e16761fa6da14801ca3bcfbcd67f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4456fadc9f77026465540025933022161dd0e16761fa6da14801ca3bcfbcd67f.exe
Resource
win10v2004-20230220-en
General
-
Target
0fc522110a728b2330db5930dd832674.bin
-
Size
3.5MB
-
MD5
7af7803481f1d7f603cc4554a17dc09d
-
SHA1
e5c95e96fb723a952d5455e9ba5f075c5a03346a
-
SHA256
537a76d0f19e83939b6a9490b70d3d95106ceeaf041904e2d47bd488f43d29d7
-
SHA512
8c55c79a4a7572cc79270d14ab5c785b7a34479388246c11472659a2c6fdd2a7bc988939c5a02ed6ff0dd14064e5060096f8f2252841197450b45580972f077e
-
SSDEEP
98304:mK4Y9J254h8R9yTuElWmhzw924GLfESbtdr6o/p5vCV9UwSx3sof6:oKhhSVk44Hth6o/LCVW5tXf6
Malware Config
Signatures
Files
-
0fc522110a728b2330db5930dd832674.bin.zip
Password: infected
-
4456fadc9f77026465540025933022161dd0e16761fa6da14801ca3bcfbcd67f.exe.exe windows x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 2.5MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 174KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 909KB - Virtual size: 912KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE