Behavioral task
behavioral1
Sample
0x000a000000013110-71.exe
Resource
win7-20230220-en
General
-
Target
0x000a000000013110-71.dat
-
Size
95KB
-
MD5
75b4c72106bf101bfe358e378f168359
-
SHA1
80efc14013be62eb50ad584762be7b5a0dcc9212
-
SHA256
16e9c53da848c95e74eb08c1635b3faa43af6c5fd3b9190b8d3915e8b27b40b1
-
SHA512
08f3fc9a6e45b49a7c58966ce65d585a099557285ad470098fef5807c2821420edbf4788450bb36ee1b46fa3b8998e3189af7448b5f8bfd227166a614fa7a237
-
SSDEEP
1536:Fqsgaq+A/lbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed243teulgS6pQl:DfZeYP+zi0ZbYe1g0ujyzdmQ
Malware Config
Extracted
redline
cheat
4.tcp.eu.ngrok.io:18632
Signatures
Files
-
0x000a000000013110-71.dat.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ