Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
General
-
Target
tmp
-
Size
95KB
-
MD5
d3f467097e25481bd4ecca34c5520b3f
-
SHA1
ce7036cea3b69437f5b5f16ad6687cd0fdb73442
-
SHA256
dcba16688898deb3e4fee8a831586a89c5809b6ed0f8ffb7a1fadbb2a9208a2d
-
SHA512
d50e25d98e2484ffc3181a598eb35d385fb22e65c26b86703e56aeb33399176c4c8457b102bea265878e030806adc94036c9479db5e260cf325849a54fc3e9eb
-
SSDEEP
1536:5qs+bqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed20tmulgS6p8l:XIwiYj+zi0ZbYe1g0ujyzdQ8
Malware Config
Extracted
redline
DeepWeb
91.92.251.234:1334
Signatures
Files
-
tmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ