Static task
static1
Behavioral task
behavioral1
Sample
53b58e46f9494806a0c94c86281171d920030e5a9a0a93a9049e79394b790be2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53b58e46f9494806a0c94c86281171d920030e5a9a0a93a9049e79394b790be2.dll
Resource
win10v2004-20220812-en
General
-
Target
53b58e46f9494806a0c94c86281171d920030e5a9a0a93a9049e79394b790be2
-
Size
56KB
-
MD5
38b710aafa46975a0482c01ae830459f
-
SHA1
2033836854a58ef74c7f80663128097a9aa7409f
-
SHA256
53b58e46f9494806a0c94c86281171d920030e5a9a0a93a9049e79394b790be2
-
SHA512
c590674b2b6196e7227b59bfead33a734a9cee49dd56e5f90162be6763861063facdae0ecbf85c76f40059ecc644bbf6bb9e249489b52e20077e16b1e0b68f7a
-
SSDEEP
1536:PL6XOFBBQARk4FIwkFV99o5PLN2+yUjfrA17NbtuB/U0Eum:PrBBQSk41G99BGc7NYxEum
Malware Config
Signatures
Files
-
53b58e46f9494806a0c94c86281171d920030e5a9a0a93a9049e79394b790be2.dll windows x86
f01b709ed4a47da71bc2c7d0ae5fcfe3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostname
ntdll
strstr
strlen
memcpy
memcmp
RtlZeroMemory
kernel32
CreateRemoteThread
lstrcmpA
TerminateThread
Sleep
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GlobalAlloc
GlobalFree
LoadLibraryA
MoveFileExA
MultiByteToWideChar
ReadFile
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
Process32Next
CreateThread
CreateToolhelp32Snapshot
IsBadCodePtr
OpenProcess
Process32First
user32
SendMessageA
GetWindowTextA
SetWindowLongA
GetKeyState
wsprintfA
CallNextHookEx
FindWindowA
GetWindowThreadProcessId
KillTimer
RegisterWindowMessageA
GetWindowLongA
SetTimer
SetWindowsHookExA
UnhookWindowsHookEx
EnumChildWindows
EnumWindows
GetAsyncKeyState
GetClassNameA
GetDlgItem
advapi32
RegQueryValueExA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
ole32
StringFromGUID2
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx0 Size: 1024B - Virtual size: 780B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.upx1 Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ