Static task
static1
General
-
Target
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91
-
Size
848KB
-
MD5
b4e35341633082e70253b945cafb08df
-
SHA1
e7ec508729326c8e81f1b19d9ab4283ded21e749
-
SHA256
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91
-
SHA512
ce34176e92184a5959ef75acbcfd610e0a0cc5850b573b9dba56583cc70e8db490d3ed3d83d73f4fdcb4ca1bda137a6bfcb3c9c0229abe0e4638d67ac04890fb
-
SSDEEP
12288:OKGRCJbQVSRuHT1d6I2AshgCtCWhAQGXfgP1j2GOQ9DC:2Ob8HTl2/gDGPqfSq
Malware Config
Signatures
Files
-
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll windows x86
dc6a30db96f3aeca33bd244bd3c5c811
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsWinEventHookInstalled
gdi32
GetCharWidthA
msvcrt
memset
powrprof
ReadPwrScheme
kernel32
GetModuleHandleW
GetSystemDirectoryW
WaitForSingleObjectEx
OutputDebugStringA
CloseHandle
GetCalendarInfoW
DefineDosDeviceA
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 572KB - Virtual size: 570KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ