iduv
Behavioral task
behavioral1
Sample
f00cac1be19e422334fadb38d19b9616402c9aca495996bb7c248aeb215c4b2f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f00cac1be19e422334fadb38d19b9616402c9aca495996bb7c248aeb215c4b2f.dll
Resource
win10v2004-20220812-en
General
-
Target
f00cac1be19e422334fadb38d19b9616402c9aca495996bb7c248aeb215c4b2f
-
Size
27KB
-
MD5
11117e2da316349f288b5c0d15b900c5
-
SHA1
823e074186d7fcb647a83f032b3e1b0d9a4b27de
-
SHA256
f00cac1be19e422334fadb38d19b9616402c9aca495996bb7c248aeb215c4b2f
-
SHA512
08ea82908dd5af7e22fbbd70877ff8cfc8a3c7c1e4c19e9516ed44c0ce0d5137e024789092b7dfd95ea0edb456b377d62f9c1641c6c8e19ce80d851046d3675e
-
SSDEEP
192:33ToU96O84GPLSw6u1DnqYh++SnEAKiTtjTF/Y6LQudojSWTWf36I:3QBNqYhvSn9jtPF/Ybud9WTWf1
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f00cac1be19e422334fadb38d19b9616402c9aca495996bb7c248aeb215c4b2f.dll windows x86
911b97ecd24458fb8fdf7aba2184131b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateThread
Sleep
CreateFileA
CloseHandle
WriteFile
LoadLibraryA
VirtualFreeEx
GetProcAddress
VirtualAllocEx
GetFileSize
GetLastError
VirtualAlloc
Exports
Exports
Sections
UPX0 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE