Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp
-
Size
99KB
-
MD5
81b67629e8ec6b301ca40f22dcf74bdb
-
SHA1
3fe754e329e017c90d507b49123c07b4a15711b7
-
SHA256
d1818eed64e65789f2a6452620485e34f6dcb60034bc2640829df9f6346a6c0e
-
SHA512
69b337785940f33256e32e71a7f5ef5ac71c069afee047b8052915bd4de03d81b9ab753a417946e763a1332ec6b1961ef05312ce7999f44e03c15df11df29bae
-
SSDEEP
1536:PG6ijoigNsLFe4l73ZUeRh/VYLrQz11cjHi8HYHKbRTllkPsfGoeNuN006dY7qu9:tCFJlbDIG4cGEDr0CeyzdxQ
Malware Config
Extracted
redline
cheat
103.170.118.35:12664
Signatures
Files
-
tmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ