Behavioral task
behavioral1
Sample
57ebc1be9d52a18a03f1341fe998afa8c54facc3d96c0bf80a201a80741d948a.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
57ebc1be9d52a18a03f1341fe998afa8c54facc3d96c0bf80a201a80741d948a.dll
Resource
win10v2004-20220721-en
General
-
Target
57ebc1be9d52a18a03f1341fe998afa8c54facc3d96c0bf80a201a80741d948a
-
Size
5KB
-
MD5
f768a1ec913aea0915bcc20c17896be3
-
SHA1
a362956664379ff9860a3c56fb1daf6e000220c4
-
SHA256
57ebc1be9d52a18a03f1341fe998afa8c54facc3d96c0bf80a201a80741d948a
-
SHA512
9fa8de6d9c4736dd0300e334137d3e60e42860f7b70dd452b35d515b3d7ebca0ef942d3bc65613d6be8e91a4f93c4c58b4e81d99649a9941cfafb46185f6dc9d
-
SSDEEP
24:ev1GSFGFajE/K3tQ3zSaJ2IkM6Pv617s3h/LjpKpuMAmwyhZojsYhK:qFGFajFK3zSIe7h/TMXhZogYhK
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Metasploit family
Files
-
57ebc1be9d52a18a03f1341fe998afa8c54facc3d96c0bf80a201a80741d948a.dll windows x86
22647e5b96f2de81d003f25d98d7d2dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ExitThread
ResumeThread
CreateProcessA
GetThreadContext
SetThreadContext
VirtualAllocEx
WriteProcessMemory
Sections
.text Size: 512B - Virtual size: 338B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ