Static task
static1
General
-
Target
1ce2f6949f9338353d372cff78e041d44414c193fe4e00ad51de593e390055cd
-
Size
4.2MB
-
MD5
0d768eebdf36bf957909d66f3fbf6f37
-
SHA1
a3fea4ac1be98f790bc8339bc216adb899dd4e0f
-
SHA256
1ce2f6949f9338353d372cff78e041d44414c193fe4e00ad51de593e390055cd
-
SHA512
f0cf38b074d482ff0c64dbaaf42624a84d4153bf9750b3c081e934af7558a3f80d0ea80b48b22bacd30c31aa25f23edcab993b06e2bac1ac441ef885eb385b87
-
SSDEEP
98304:ad4R3VhUznrIVNV00e3S9b0+uiOtGDW/iiWWuggp9RkrtPpfB:w4R3acVBIw0nEDW/MgC9ROnB
Malware Config
Signatures
Files
-
1ce2f6949f9338353d372cff78e041d44414c193fe4e00ad51de593e390055cd.exe windows:5 windows x86
b4164898143d8dc833316486e3ec834f
Code Sign
50:b0:5a:1a:bc:89:83:de:ad:da:b5:aa:52:67:c7:43Certificate
IssuerCN=522a143c46533d0e442f37555c2422100a1455182550573d31351d0f013134332d19,POSTALCODE=10802,ST=0b1c1115005f5c4e161100021c001003011215104d0a110f+ST=0b1c1115494a5c05125116195f151d00521f0d135111515d03161110070d03151709010f5103081c0b00040b545d06080b0b050e060b08091d5301090612055b0c0b0a070bNot Before12-10-2023 19:52Not After11-10-2024 19:52SubjectCN=522a143c46533d0e442f37555c2422100a1455182550573d31351d0f013134332d19,POSTALCODE=10802,ST=0b1c1115005f5c4e161100021c001003011215104d0a110f+ST=0b1c1115494a5c05125116195f151d00521f0d135111515d03161110070d03151709010f5103081c0b00040b545d06080b0b050e060b08091d5301090612055b0c0b0a070b16:b2:c1:75:c8:94:b2:6c:65:35:a1:4f:72:c6:76:0c:34:88:a2:e9:0d:da:d2:d3:b3:41:12:cc:95:de:13:13Signer
Actual PE Digest16:b2:c1:75:c8:94:b2:6c:65:35:a1:4f:72:c6:76:0c:34:88:a2:e9:0d:da:d2:d3:b3:41:12:cc:95:de:13:13Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
GetConsoleAliasesLengthW
GetLocaleInfoA
GetConsoleAliasExesA
CommConfigDialogA
FindResourceW
BuildCommDCBAndTimeoutsA
MapUserPhysicalPages
OpenJobObjectA
ReadConsoleA
InterlockedDecrement
QueryPerformanceCounter
GetEnvironmentStringsW
GetModuleHandleExW
WriteConsoleInputA
SetComputerNameW
FreeEnvironmentStringsA
SetThreadUILanguage
FindNextVolumeMountPointA
ConvertFiberToThread
GetWindowsDirectoryA
GetCompressedFileSizeW
WaitNamedPipeW
EnumTimeFormatsA
WriteFile
GetCommandLineA
GetDriveTypeA
GetEnvironmentStrings
FindResourceExA
GetConsoleCP
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
SetConsoleCP
DeleteVolumeMountPointW
EnumSystemCodePagesA
GetFileAttributesW
SetSystemPowerState
GetAtomNameW
GetComputerNameA
GetACP
GetVolumePathNameA
GetStartupInfoW
GetNamedPipeHandleStateW
GetConsoleAliasesW
FindFirstFileA
OpenMutexW
GetLastError
SetLastError
PeekConsoleInputW
VerLanguageNameA
SetVolumeLabelW
HeapUnlock
MoveFileW
CopyFileA
GetTempFileNameA
FindClose
LoadLibraryA
LocalAlloc
CreateHardLinkW
AddAtomW
RemoveDirectoryW
SetCommMask
GetTapeParameters
FoldStringW
GetPrivateProfileSectionNamesA
FindNextFileA
GetModuleHandleA
GetStringTypeW
GetConsoleTitleW
VirtualProtect
FatalAppExitA
GetShortPathNameW
SetCalendarInfoA
OpenSemaphoreW
FindFirstVolumeW
ReadConsoleOutputCharacterW
DeleteFileA
FlushFileBuffers
SetStdHandle
SetFilePointer
CreateFileW
GetVolumeNameForVolumeMountPointA
MoveFileA
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WideCharToMultiByte
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
GetModuleFileNameW
EncodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetOEMCP
IsValidCodePage
SetHandleCount
GetFileType
CloseHandle
FreeEnvironmentStringsW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
RtlUnwind
LCMapStringW
MultiByteToWideChar
RaiseException
WriteConsoleW
user32
CharUpperBuffA
CharUpperW
gdi32
GetTextFaceA
winhttp
WinHttpReadData
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xuhoka Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pumatol Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ