Behavioral task
behavioral1
Sample
2768-13-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2768-13-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
2768-13-0x0000000000400000-0x000000000041C000-memory.dmp
-
Size
112KB
-
MD5
ad0cebc5a419aa91fe2bce0b2133d222
-
SHA1
210d61197611d4d0af700084b82feec7443f176a
-
SHA256
cb7f40ecd3f6186e1cdc65533431f290ac9f45049e92c1dc8b6422f151c89dc8
-
SHA512
aca2bebae1cb36248c7d49e2d03330b566fdd1355798749397ca4b1225d5eb2b76b2187fed168638e86a7c2b799dd38d6020480ce3954d25f8820efbc9002208
-
SSDEEP
1536:m8oOwTixqT+4tvgJFVLTOLwnyhqCx/BHb+O9ltEofNYTvPEKlkzmrUm:OOd/3lOMyhiOTUEKprU
Malware Config
Extracted
pony
http://nsslawcollege.org/look/gate.php
Signatures
Files
-
2768-13-0x0000000000400000-0x000000000041C000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE