Static task
static1
General
-
Target
6cd903b97f57e49c32c7dd1e791f183b6e6bf03fc4e1a52b306f1d7e91ab88cc
-
Size
4.2MB
-
MD5
0b4045057c65b591a16ca27304343569
-
SHA1
0f80d41ed8cb8e6a063fbb4344bbe5ee6e7d5f45
-
SHA256
6cd903b97f57e49c32c7dd1e791f183b6e6bf03fc4e1a52b306f1d7e91ab88cc
-
SHA512
8d121a1c62e934ec54e49c0d6b4ae3972ad80766614a1ffd82125ba8e1e014029941ee28b9f9f96c8703199084d81a709d2067210b3ba32d8d6363083c5c985e
-
SSDEEP
98304:2U6F8tMrFUD92n9dPcKr48pjTryVLHI7oxEqC816GFPl3PRRc:QF86rFUDEn9dPcx6niLHDxE5C3PRC
Malware Config
Signatures
Files
-
6cd903b97f57e49c32c7dd1e791f183b6e6bf03fc4e1a52b306f1d7e91ab88cc.exe windows x86
c3945e210b1009128598ead2a7524d0f
Code Sign
31:ef:2e:0c:19:50:2f:d3:87:e4:4c:60:78:e0:bc:c8Certificate
IssuerCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10802,ST=0b1c1115005f5c4e0f020a1000040b144b1e0e06000a14+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bNot Before18/05/2023, 20:04Not After17/05/2024, 20:04SubjectCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10802,ST=0b1c1115005f5c4e0f020a1000040b144b1e0e06000a14+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bae:84:f8:63:88:3d:e3:44:f4:d5:f0:04:1a:33:ed:55:c1:23:5b:87:a5:18:e3:68:8f:81:c5:a2:33:9f:83:edSigner
Actual PE Digestae:84:f8:63:88:3d:e3:44:f4:d5:f0:04:1a:33:ed:55:c1:23:5b:87:a5:18:e3:68:8f:81:c5:a2:33:9f:83:edDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsW
ReadConsoleOutputAttribute
CancelWaitableTimer
InterlockedCompareExchange
SetComputerNameW
AddConsoleAliasW
GetModuleHandleW
GetConsoleTitleA
TlsSetValue
GlobalAlloc
FatalAppExitW
GetStringTypeExW
HeapDestroy
GlobalFlags
DnsHostnameToComputerNameW
FindNextVolumeW
IsDBCSLeadByte
GetModuleFileNameW
CreateActCtxA
lstrlenW
ReplaceFileA
GetTempPathW
GetLargestConsoleWindowSize
GetConsoleAliasA
SetProcessAffinityMask
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
LocalLock
ReadFileEx
ResetEvent
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
DnsHostnameToComputerNameA
GetNumberFormatW
OpenEventA
FindAtomA
GetTapeParameters
GetDefaultCommConfigA
FindFirstVolumeMountPointA
GetModuleHandleA
SetLocaleInfoW
RequestWakeupLatency
GetWindowsDirectoryW
DebugBreak
EnumCalendarInfoExA
EnumSystemLocalesW
ReadConsoleA
GetConsoleAliasesLengthW
lstrlenA
SetThreadContext
GetTempFileNameW
GetLastError
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapCreate
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsFree
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
gdi32
GetCharABCWidthsFloatW
GetCharWidthW
EnumFontsA
GetCharABCWidthsI
advapi32
MapGenericMask
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ