Static task
static1
Behavioral task
behavioral1
Sample
spoofer23 - Copy.vmp.exe
Resource
win10v2004-20230221-es
General
-
Target
spoofer23 - Copy.vmp.exe
-
Size
639KB
-
MD5
0093d85266c5711bc99d2d4cb6e4b1bc
-
SHA1
9b88a041d3b82115821a8d9eba8b1625255668c2
-
SHA256
9fae15eb48ee7db90c9372b6ab4e5d6978e617d423c92ad5ad0bde2665809657
-
SHA512
46b5d2bf914bb5920206d37283978618e4ec2efbe8c8a2c1b0dd712eb61aca1e5e2f717a646bced9e131c8069e578bd7da9c2a005784659b90c55a1546068aa3
-
SSDEEP
12288:qOOqgdxfhhwMFWSj/Q0MH2OrzyMqamcnu5Sqx88sD329s/qfy+ow:qG+/1FWaQT/yP3D5SPb9F
Malware Config
Signatures
Files
-
spoofer23 - Copy.vmp.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.lAm Size: - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.htw Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XBX Size: 636KB - Virtual size: 635KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ