Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKD.4302624.24222.24270.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.GenericKD.4302624.24222.24270.exe
Resource
win10v2004-20230221-en
General
-
Target
SecuriteInfo.com.Trojan.GenericKD.4302624.24222.24270.exe
-
Size
43KB
-
MD5
b40a929f8a00a1b34869ddf1556a1a0e
-
SHA1
848f470a5c5f3975720038cac8d93f9cca9b72a1
-
SHA256
dff9a9722f7d999b06a1e0961454550307a8c6886aa41f24fe34a34d94fd2b4f
-
SHA512
17658ab186232502eb79fba9bc2b95f033deab6a1c6e0623f9d7ec9277130c2389e33f80f4a049c13101cb84c180e09073d6c37aec4f3a0d67561d06e27ff922
-
SSDEEP
768:iKTcCMzm81ZMzBU16VQY1NrlIioyLgLL4JRM8f935OHsw3:iKTcCu1snh1Rboy0P8RMGjw3
Malware Config
Signatures
Files
-
SecuriteInfo.com.Trojan.GenericKD.4302624.24222.24270.exe.exe windows x86
b92682f5ffeb6701642dfd661de4ddeb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord2248
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord2990
ord3718
ord5226
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord757
ord605
ord6090
ord1670
ord356
ord1054
ord3830
ord5712
ord1207
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord295
ord6138
ord784
ord6182
ord911
ord5529
ord781
ord6280
ord1084
ord6065
ord572
ord1614
ord2566
ord785
ord2272
ord3997
ord5563
ord300
ord1482
ord2933
ord299
ord6118
ord1489
ord2322
ord907
ord2469
ord266
ord762
ord764
ord6003
ord618
ord370
ord304
ord2271
ord310
ord865
ord908
ord297
ord578
ord1187
ord3719
ord1191
msvcr71
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
_strnicmp
__p___argc
__p___argv
strncmp
memcmp
sscanf
strncpy
atoi
_snprintf
memcpy
strlen
strcmp
time
srand
rand
memset
strcpy
_strlwr
strstr
malloc
free
??1type_info@@UAE@XZ
_setmbcp
__security_error_handler
_CxxThrowException
_resetstkoflw
_except_handler3
isalnum
__CxxFrameHandler
realloc
kernel32
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
Sleep
GetTickCount
InterlockedDecrement
GetTimeZoneInformation
GetModuleFileNameA
MoveFileExA
CloseHandle
WriteFile
CreateFileA
LeaveCriticalSection
GetLastError
GetLocalTime
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteCriticalSection
InitializeCriticalSection
SetPriorityClass
GetCurrentProcess
GlobalAlloc
GetModuleHandleA
LoadLibraryW
SetUnhandledExceptionFilter
WriteProcessMemory
VirtualProtect
IsBadStringPtrA
ExitProcess
GetStartupInfoA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcmpiA
lstrlenW
EnterCriticalSection
LocalFree
lstrlenA
user32
PeekMessageA
IsWindow
SendMessageA
TranslateMessage
DispatchMessageA
GetClientRect
GetWindowRect
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
ole32
CoUninitialize
CoCreateGuid
CoInitialize
oleaut32
SysAllocStringLen
SafeArrayCreate
SafeArrayPutElement
SysAllocString
VariantCopy
SysFreeString
SysStringLen
SysAllocStringByteLen
SysStringByteLen
VarBstrCmp
VariantInit
VariantClear
GetErrorInfo
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ