Static task
static1
Behavioral task
behavioral1
Sample
5368ea02013caf735a4483b78b589007c371a8d46bd104a5cec1bcb5c80fc22c.exe
Resource
win10-20230220-en
General
-
Target
10176257844.zip
-
Size
174KB
-
MD5
b8d3fbf52772645b2dc1a3a9b987cbde
-
SHA1
c1ea0cd40fd5a03e69bb6ba71e9fb6f4521e82d0
-
SHA256
dd09a38caea52e391dda4280b41642800a5d631f04334ac8e7761c0ba7073c5c
-
SHA512
4344e58604f6d025f1dfef86a82695bc026ed4bf6aec5b50982dfd7e6a491115928a18eb003a17196b77ee340797263c6df3a4a398b740b8b794461290a7f851
-
SSDEEP
3072:h+U44utKT70sLJZAw6huvrqki7oyce3NQAAd7TslCj5/gQb1ZKlViiYpEVYT:AU4VtslAhuDrIoycmNQDd0knWYpSYT
Malware Config
Signatures
Files
-
10176257844.zip.zip
Password: infected
-
5368ea02013caf735a4483b78b589007c371a8d46bd104a5cec1bcb5c80fc22c.exe windows x86
1a365c75673e54e5722aa34d02af2fc8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
LoadAcceleratorsW
gdi32
DeleteDC
advapi32
LookupPrivilegeValueW
shell32
ShellExecuteW
ws2_32
WSAStartup
Sections
.text Size: 170KB - Virtual size: 564KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE