Static task
static1
General
-
Target
scp_spoofer.exe
-
Size
80KB
-
MD5
0b089f2b1e66e8d328d0225bdd1c5a65
-
SHA1
6a1f9d5e1950f8a35b763a777f89508bf0d5a087
-
SHA256
e112920d46621388e3a9eec0c7b062eeb7d1bd7c3720448d7748cb9340246520
-
SHA512
0b0a034bf18ff69e75c0f73de71505c8967499b06131ac936078b3a402c8755c8813af91086d6fd45027dfe58c899a0205a1a5068cfdb1efd23d88366cac6890
-
SSDEEP
1536:x8KU95KLwKNw0KPwQrDBt/mBd/BVafU/oFRO:x8n95KLwKwPwQrWdpofU/oXO
Malware Config
Signatures
Files
-
scp_spoofer.exe.exe windows x86
827f4f6f7e4e827b29dc651a7947ef5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
GetModuleFileNameA
GetStdHandle
Sleep
GetTickCount
SetConsoleTextAttribute
SetConsoleCursorInfo
SetConsoleCursorPosition
GetVolumeInformationA
GetConsoleMode
ExitProcess
TerminateProcess
GetCurrentProcess
GetCommandLineA
GetVersion
SetHandleCount
GetFileType
GetStartupInfoA
GetLastError
ReadFile
SetFilePointer
HeapFree
CloseHandle
GetFileAttributesA
GetProcAddress
GetModuleHandleA
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
HeapAlloc
SetStdHandle
FlushFileBuffers
VirtualAlloc
HeapReAlloc
CreateFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
WriteConsoleA
ReadConsoleInputA
SetConsoleMode
winmm
timeGetTime
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ