Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_6eedfb4d8fea7be9f0a5a92819c2c310.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_6eedfb4d8fea7be9f0a5a92819c2c310.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_6eedfb4d8fea7be9f0a5a92819c2c310
-
Size
34KB
-
MD5
6eedfb4d8fea7be9f0a5a92819c2c310
-
SHA1
fa9437f496320ecd19ada5ae51ca50321ed9db5a
-
SHA256
8865d9189dd00a537e514f9b1ed4324b5fcf5e66356f83c816a2f8df9f985c0c
-
SHA512
13f63f3995866971b681f38e0c6628a628c099d9144e7d257b8e5a8eb391a8da01199bb130fead8cfc4c98c73a630ba2b66d40edfde0c412df04aefdb8e744f8
-
SSDEEP
96:OlreTMdy6twtdbFpfArvG8eXEVMGEJBNw+oteiQL2nE4Y+nVLSZ:9gdviR2je0VQJ7HWt9VLa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_6eedfb4d8fea7be9f0a5a92819c2c310
Files
-
VirusShare_6eedfb4d8fea7be9f0a5a92819c2c310.exe windows:4 windows x86 arch:x86
04624843a73faf1fe748b798d5680ee2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetDlgItemTextA
GetDlgItemTextA
EndDialog
DialogBoxParamA
wsprintfA
SetTimer
kernel32
lstrlenA
lstrcatA
RtlZeroMemory
GetPrivateProfileStringA
GetModuleHandleA
GetCurrentDirectoryA
ExitProcess
wsock32
WSAAsyncSelect
WSAGetLastError
WSAStartup
connect
gethostbyname
htons
ioctlsocket
recv
send
socket
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 674B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fpoystd Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE