Static task
static1
Behavioral task
behavioral1
Sample
b3cc0b10d73013be020dabf21673cff41c4621eba22a4068ecac4ac0d56d700e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3cc0b10d73013be020dabf21673cff41c4621eba22a4068ecac4ac0d56d700e.dll
Resource
win10v2004-20220901-en
General
-
Target
b3cc0b10d73013be020dabf21673cff41c4621eba22a4068ecac4ac0d56d700e
-
Size
64KB
-
MD5
083403a82b53d0fc707c820f3b98c8c6
-
SHA1
e1ffdbbf01382328ebdebc4ca51d2bf67a3579d4
-
SHA256
b3cc0b10d73013be020dabf21673cff41c4621eba22a4068ecac4ac0d56d700e
-
SHA512
5cf676ed4e76706fa727eec1b21be5a2341de85f820defb5e718773c3e87482e2cf72e3a9eeb9266b031765bd34a830614fe92b6a6271791a2eab9e31201e607
-
SSDEEP
1536:l8r8QySWLTOWXbmAYSXIOmnToIf9Me59K:le7ySYTXbxSTBf919K
Malware Config
Signatures
Files
-
b3cc0b10d73013be020dabf21673cff41c4621eba22a4068ecac4ac0d56d700e.dll windows x86
1ba1933740e3ca141f6d9777b021ee01
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
VirtualAlloc
GetProcAddress
LoadLibraryA
lstrlenA
MultiByteToWideChar
lstrcpyA
FreeLibrary
HeapFree
LoadLibraryW
lstrcatA
user32
wsprintfA
shell32
SHGetSpecialFolderPathA
ws2_32
setsockopt
connect
WSACleanup
WSAStartup
htons
gethostbyname
socket
recv
select
send
closesocket
gethostname
WSAIoctl
getsockname
msvcrt
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_beginthreadex
_except_handler3
strcat
strcmp
malloc
strstr
free
realloc
exit
strchr
strcpy
atoi
??3@YAXPAX@Z
memcpy
_ftol
__CxxFrameHandler
memset
??2@YAPAXI@Z
memcmp
_CxxThrowException
strlen
wcscpy
netapi32
NetLocalGroupAddMembers
NetUserAdd
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ