Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/AEP transducers/TorqueKal/TorqueKal.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/AEP transducers/TorqueKal/TorqueKal.exe
Resource
win10v2004-20230220-en
General
-
Target
TorqueKal.exe
-
Size
92KB
-
MD5
0bbc7c3b70edc3f7c2debb48865efb9f
-
SHA1
bb1cb7de6b3b472dfab5e7f6d14749f47f875428
-
SHA256
2e74c6ea5c7cf250d2f8b59db6487b2e475a2564bdda18b3af1aef8b1274104f
-
SHA512
064671437110859a82f1d017291ee9235f8879766ace2f1b23e405afba8b160ab0f0d6e4224b605c4d8fff6a68269566de599d5f62f04ec3e7b015fde6d727bd
-
SSDEEP
1536:NN3WpTzb5CtXJxwaB3lTb6KCCmrB5qSXh2hrWVXzNeVzn/BIoTzGdxYw5hu8gPBy:TYstXs+3V6TShrEQ3XG7n2P0
Malware Config
Signatures
Files
-
TorqueKal.exe.zip
Password: ow&b!54X6x_#4gT@9BT4
-
Device/HarddiskVolume3/AEP transducers/TorqueKal/TorqueKal.exe.exe windows x86
Password: ow&b!54X6x_#4gT@9BT4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
CLOVER_A Size: - Virtual size: 224KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CLOVER_B Size: 102KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
manifest.json