Behavioral task
behavioral1
Sample
900-67-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
900-67-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
900-67-0x0000000000400000-0x000000000041C000-memory.dmp
-
Size
112KB
-
MD5
1d1ced4f8fd59573842961ffd17a3632
-
SHA1
9489edce0fe411833415ea1e2ffd708e8a466960
-
SHA256
3e458e05c9d729a73e1aeb88d426d9ae3b31e0de55733cc3e418fb25e0ec3bff
-
SHA512
3b2a3bb8845849fca6e5a4a128626547e2ced370454c46f81f334bbfec899904f6210331a075eefb2e764e6fd6e5bc8b1618e0962e413c1bfd310b2d9fe12cbe
-
SSDEEP
1536:vQ/gC6ZjmJQ8FqT/L1Ma7hM4sAJF+RpQk7v78TPAc7IRO32JTvREoTkzZFlz:vQ/Zpu/thJVF+Rp/PAPIOSEocFlz
Malware Config
Extracted
pony
http://ranmabo.tk/no/gate.php
-
payload_url
http://magic-skid.com/shit.exe
http://skid.com/calculator.exe
Signatures
Files
-
900-67-0x0000000000400000-0x000000000041C000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE