Static task
static1
Behavioral task
behavioral1
Sample
2444d593570486eef9cd1a022839032de9b4e6dc5e40c51b56b70ad86b7004ca.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2444d593570486eef9cd1a022839032de9b4e6dc5e40c51b56b70ad86b7004ca.exe
Resource
win10v2004-20230221-en
General
-
Target
2444d593570486eef9cd1a022839032de9b4e6dc5e40c51b56b70ad86b7004ca
-
Size
5.9MB
-
MD5
a1cae1b33eb09300e66ba33e022cb904
-
SHA1
1b10c7f2fcf4a0329fefb8592bc84d51f7d4f9ed
-
SHA256
2444d593570486eef9cd1a022839032de9b4e6dc5e40c51b56b70ad86b7004ca
-
SHA512
1e6be5ba3cfcf83d7590eba8925cbeaf1b760ae3995bbf0687d1073717f5da279ce29f6781ea6a12820c41686a089ced8e65bebd5b8b2734c3e38041d7817fba
-
SSDEEP
98304:bG3u/z+eRjCbI9beTrk5Xfk134/4gOTg1ss4ZQ82MS+l+Dwelw:bxycjCbI9be8OXTgCPZQ8++Wdlw
Malware Config
Signatures
Files
-
2444d593570486eef9cd1a022839032de9b4e6dc5e40c51b56b70ad86b7004ca.exe windows x86
19e0a34398ad53fb4358b2153705f6e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
kernel32
SetCurrentDirectoryA
user32
GetCursorPos
gdi32
SetMapMode
winmm
waveOutRestart
winspool.drv
DocumentPropertiesA
advapi32
RegCreateKeyExA
shell32
ShellExecuteA
ole32
CLSIDFromString
oleaut32
UnRegisterTypeLi
comctl32
ImageList_Destroy
ws2_32
inet_ntoa
wininet
HttpQueryInfoA
comdlg32
GetSaveFileNameA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 4.4MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1008KB - Virtual size: 1008KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 484KB - Virtual size: 484KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ