Behavioral task
behavioral1
Sample
tungbotexe.exe
Resource
win7-20230621-en
General
-
Target
tungbotexe.exe
-
Size
100KB
-
MD5
d6421cc1dd62ad1d2cbb47d111491704
-
SHA1
90e5ea575728049d29ba8d0e83adb3595846b047
-
SHA256
3d5d91613033f94c7b22b38b15351089265d158fd2fb6dabc9d671592c2aabb8
-
SHA512
48a32462245e4f42d3dda11f0462a8afedd7b97195f21dd78f22d8a1c986b66f3194b6e113982ae1adf4c97f304a9c4335a7212d96d76658df881755625d6844
-
SSDEEP
1536:SyoSAkUG6jejoigIcWqEVamw/GSPqL4IWOO/AIdbfHSCv0uuXyyedOxtCgfLpoNZ:SuAxYc849uNvByvr0ueyzddZ
Malware Config
Extracted
redline
cheat
103.173.227.25:12664
Signatures
Files
-
tungbotexe.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ