Behavioral task
behavioral1
Sample
1324-4-0x0000000040000000-0x000000004000C000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1324-4-0x0000000040000000-0x000000004000C000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
1324-4-0x0000000040000000-0x000000004000C000-memory.dmp
-
Size
48KB
-
MD5
882ae957e4c42a2d276a8dd6c93af86a
-
SHA1
a29c7d499d0d64d939767ba7390b9fbade1449aa
-
SHA256
6444a202bad795368728568f29877d4ce581ec700f259241c21946b0784dc9f4
-
SHA512
e28f29dc7128b998e4aff4585b7a71e836ff22e88e54d3e32ce51d88133f5b94c759a59d3c073b8f774a053377077063d3b22cdc8663b27980d6c37d91b29679
-
SSDEEP
768:8Ohgqs2XraqJ0O95ZFpB5w8TNZeDd/EeVoqYg06if15:8RWT0O95BB5w8BQE1DXj1
Malware Config
Extracted
buer
https://165.232.118.210/
Signatures
Files
-
1324-4-0x0000000040000000-0x000000004000C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 27KB - Virtual size: 1024.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1024.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 1024.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1024.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ