UMEP
VFEP
Static task
static1
Behavioral task
behavioral1
Sample
3e3a6c6658c7352b6415b1a0b5d7e22716f39a686c52e048200cc07f185be2f0.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3e3a6c6658c7352b6415b1a0b5d7e22716f39a686c52e048200cc07f185be2f0.dll
Resource
win10v2004-20220414-en
Target
3e3a6c6658c7352b6415b1a0b5d7e22716f39a686c52e048200cc07f185be2f0
Size
2.0MB
MD5
19743d8e8590b5f644d452a9ddd77435
SHA1
28c454042b155c4356c2a78b64c25ddf020b8eba
SHA256
3e3a6c6658c7352b6415b1a0b5d7e22716f39a686c52e048200cc07f185be2f0
SHA512
5743c1a3112ee13aefd30f8f3291a32b31e04782c23f03a64c3996d30022c6c5c0051f945450f814a0834758488eb9e0dc3481d706c7b643011cd06c19f8aa71
SSDEEP
49152:utb9JIdmNgW8Du4CuK5GN8NnpUnzezUJWJEy+yDgFP8Jz:GUDsdNnOasS/xDc8Jz
File contains strings specific to ComRAT v4 samples first seen in 2017.
resource | yara_rule |
---|---|
sample | ComRAT |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateFileW
ExpandEnvironmentStringsW
IsBadStringPtrA
GetCurrentProcess
OpenProcess
GetLocalTime
SetHandleInformation
ReadFile
MultiByteToWideChar
CreatePipe
GetProcAddress
LoadLibraryA
OpenEventW
GetFileSize
SetFilePointer
WriteFile
GetModuleHandleW
LoadLibraryW
GetVersionExW
VirtualProtectEx
GetExitCodeThread
lstrcmpiW
OutputDebugStringW
VirtualFreeEx
ReadProcessMemory
VirtualAllocEx
GetModuleHandleA
WriteProcessMemory
CreateThread
WideCharToMultiByte
CreateDirectoryW
DeleteFileW
CloseHandle
CreateEventW
TerminateProcess
Sleep
CreateProcessW
GetLastError
GetTickCount
WaitForSingleObject
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetOEMCP
InitializeCriticalSection
SetStdHandle
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
ReadConsoleW
GetSystemTimeAsFileTime
GetFileAttributesExW
GetStringTypeW
EncodePointer
DecodePointer
HeapFree
HeapAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
GetModuleHandleExW
HeapReAlloc
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetStdHandle
GetFileType
GetModuleFileNameW
WriteConsoleW
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetEnvironmentVariableW
SetEnvironmentVariableA
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
FreeLibrary
LoadLibraryExW
HeapSize
GetProcessHeap
GetTimeZoneInformation
SetFilePointerEx
FlushFileBuffers
GetConsoleCP
GetConsoleMode
IsValidCodePage
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEndOfFile
CryptGenRandom
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
CryptReleaseContext
CryptAcquireContextW
GetModuleBaseNameA
EnumProcessModulesEx
EnumProcessModules
UMEP
VFEP
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ