DdpmfnkaErn
Static task
static1
Behavioral task
behavioral1
Sample
54bc259cccba64f98941b3267379940093aa14083731cee2b8b5d7939e3fb123.dll
Resource
win7-en-20211208
General
-
Target
54bc259cccba64f98941b3267379940093aa14083731cee2b8b5d7939e3fb123
-
Size
177KB
-
MD5
a8b2c5da89b6054c835ea28a6ecf1350
-
SHA1
dc7c1fb4719d8b3beac6577feb0db2240905931a
-
SHA256
54bc259cccba64f98941b3267379940093aa14083731cee2b8b5d7939e3fb123
-
SHA512
c9d1d609ae2cda5984dd789e41936d1d938a1c9d47298b9a878a703e1677ae0a9f89a23e9316897d36c13bc10ad7fc5078d4a0c1d2ab20c2c44ca8b16d3499b9
-
SSDEEP
3072:hoNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8ShrKI6bl/g:iaIzLgKrjbvUAjERycp6c8qgATA2TQU
Malware Config
Signatures
Files
-
54bc259cccba64f98941b3267379940093aa14083731cee2b8b5d7939e3fb123.dll windows x86
24dc00c1ffa2966f43f61678325f2065
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasGetEapUserDataW
oleaut32
VarCyFromDate
user32
EnumThreadWindows
TranslateMessage
ole32
HGLOBAL_UserFree
CoEnableCallCancellation
CreateGenericComposite
shlwapi
ColorRGBToHLS
AssocCreate
secur32
DeleteSecurityContext
crypt32
CertFindChainInStore
msvcrt
memset
shell32
SHBrowseForFolderW
rpcrt4
RpcEpRegisterW
RpcServerRegisterIfEx
gdi32
CreateMetaFileA
kernel32
CloseHandle
OutputDebugStringA
SetConsoleWindowInfo
GetSystemDefaultLangID
SetPriorityClass
GetTempFileNameA
GetModuleFileNameA
advapi32
RegOverridePredefKey
Exports
Exports
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ