Behavioral task
behavioral1
Sample
43c187b6d6cdd82b48ae77f1eb89d98e3df3f07da779c937001cde59ec01c7ff.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43c187b6d6cdd82b48ae77f1eb89d98e3df3f07da779c937001cde59ec01c7ff.dll
Resource
win10v2004-20220812-en
General
-
Target
43c187b6d6cdd82b48ae77f1eb89d98e3df3f07da779c937001cde59ec01c7ff
-
Size
62KB
-
MD5
61436a49acfac0ebf51643d18da3e6b6
-
SHA1
4fa4234429c5519cba5052d582083f3fd81c2252
-
SHA256
43c187b6d6cdd82b48ae77f1eb89d98e3df3f07da779c937001cde59ec01c7ff
-
SHA512
960281324a96760079eac99a62027c3d6f9e09192a2ed40f2d282f024a68331df92e6ac4e11ef7567b68006957fb66470f0983cb3f967c932baea11aa5e33b20
-
SSDEEP
768:rv8dIBqbyvmH614G7+Ywuj32qyYlG/J1tHlhU0BAd62N:rhBqbAmH6+GyYwuj32qyCg1JUN
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
43c187b6d6cdd82b48ae77f1eb89d98e3df3f07da779c937001cde59ec01c7ff.dll windows x86
7f010ad18668cdc8110b5b38aaaa6e5f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProcessMemory
VirtualProtectEx
GetModuleFileNameA
GlobalFree
ReadProcessMemory
GlobalLock
GlobalAlloc
GetCurrentProcess
CreateThread
GetPrivateProfileStringA
Sleep
GetPrivateProfileIntA
GetModuleHandleA
OutputDebugStringA
CloseHandle
CreateEventA
OpenEventA
GetCommandLineA
IsBadReadPtr
GetTickCount
WideCharToMultiByte
VirtualAlloc
VirtualFree
GetProcAddress
LoadLibraryA
GetCurrentThreadId
CreateProcessA
GetTempPathA
GetVersionExA
ExitProcess
user32
wsprintfA
GetWindowTextA
FindWindowA
GetMessageA
PostThreadMessageA
GetInputState
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
ws2_32
Sections
UPX0 Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE