Behavioral task
behavioral1
Sample
2856-74-0x0000000000400000-0x00000000007E4000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2856-74-0x0000000000400000-0x00000000007E4000-memory.exe
Resource
win10v2004-20230831-en
General
-
Target
2856-74-0x0000000000400000-0x00000000007E4000-memory.dmp
-
Size
3.9MB
-
MD5
856e3f1e873d962d86c6c065e1e158b5
-
SHA1
57778be8ba2e9ab8a972abdc0e9d20318b0805fa
-
SHA256
c988416e94db430ee34f7f8e1d323201e1184289a066c7e85cae323946358b5c
-
SHA512
f697fc7862a4f0da786e70a1ef2d17e91e9fab458ff29c2907103d7713da99cf7d1b29a86b9132ab67c542ff2675bf1ce0711b194285f9b9d743d145172619f7
-
SSDEEP
98304:f77Pmq33rE/JDLPWZADUGer7B6iY74M/umlwXVZ:3+R/eZADUXR
Malware Config
Extracted
bitrat
1.38
xwm.dynuddns.com:8889
-
communication_password
cba52b50d9cf77a308a6bedcd075f95e
-
tor_process
tor
Signatures
Files
-
2856-74-0x0000000000400000-0x00000000007E4000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE