DllInstall
DllRegisterServer
Behavioral task
behavioral1
Sample
5ef27986b7ef4f221c7c7ed2bb1cc50eeb304c2f41e4c5c6b3288f752dc6591e.dll
Resource
win7-20220901-en
Target
5ef27986b7ef4f221c7c7ed2bb1cc50eeb304c2f41e4c5c6b3288f752dc6591e
Size
125KB
MD5
0f5f61804e97020ee67ada4122431d8f
SHA1
e94c460d44f1be5b4b05af538d1e2bc8c66f9dde
SHA256
5ef27986b7ef4f221c7c7ed2bb1cc50eeb304c2f41e4c5c6b3288f752dc6591e
SHA512
2adca3101d16faea46a6010b807cc140b518064409b1090a3593c5ed7563c36d198f2c257f6fe7e95745b4458efca05a5ad6f59f59f3c50024918572b64d0e1f
SSDEEP
3072:jK2Iz3qTaCJR/ei+AC3JT/zjwTBfphYi7:joqOCJRGiLC3JzzjwTBh2i7
qakbot
221.44.158.12:15899
135.59.24.163:19546
94.7.79.144:54878
227.150.243.114:39154
215.194.96.116:37650
45.64.184.122:25478
85.137.184.169:59234
107.26.25.92:56712
226.156.21.185:57237
29.90.187.89:14834
206.16.38.205:59801
155.151.97.59:36109
47.219.184.104:36930
252.7.46.182:4067
140.243.25.205:24064
94.93.131.253:65187
28.236.43.99:25246
110.175.218.118:43672
159.220.92.54:39126
233.60.229.213:1774
40.238.73.215:25641
168.152.8.85:14726
51.27.237.220:643
38.179.148.136:10087
155.35.214.28:45472
174.73.95.203:57098
253.87.188.28:55082
146.111.123.235:53182
69.139.176.16:5091
174.247.113.60:16625
82.34.204.163:29554
38.149.44.210:27362
75.150.190.231:49453
233.28.178.189:51109
156.55.175.218:18225
226.245.201.147:56691
30.208.231.241:3060
242.154.104.135:0
62.228.78.206:44566
88.203.47.199:48997
23.115.133.62:57748
217.190.219.41:29447
236.129.127.216:10887
179.121.12.220:50554
156.164.32.211:21954
239.86.43.169:5793
139.44.244.27:5564
193.133.234.0:0
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
memchr
_strtoi64
_errno
_snprintf
qsort
_vsnprintf
memset
_time64
_vsnwprintf
malloc
strncpy
strchr
strtod
localeconv
_ftol2_sse
free
atol
memcpy
FindNextFileW
GetTickCount
GetModuleHandleA
GetWindowsDirectoryW
GetCurrentDirectoryW
CreateMutexW
DuplicateHandle
GetCurrentThread
lstrcmpA
GetLastError
lstrcatA
CreateDirectoryW
DisconnectNamedPipe
lstrcpynW
GetProcessId
lstrcatW
lstrcpyW
GetOEMCP
GetFileAttributesW
lstrcmpiW
GetDriveTypeW
K32GetModuleFileNameExW
MoveFileW
lstrcpynA
lstrlenW
GetCurrentProcessId
SwitchToThread
GetModuleHandleW
GetProcAddress
HeapCreate
HeapFree
HeapAlloc
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
FreeLibrary
lstrcmpiA
GetSystemTimeAsFileTime
SetThreadPriority
GetExitCodeProcess
FindFirstFileW
GetSystemInfo
SetFileAttributesW
LocalAlloc
FlushFileBuffers
LoadLibraryW
GetCommandLineW
GetVersionExA
GetIconInfo
CopyIcon
GetDC
CharUpperBuffA
CharUpperBuffW
RegisterClassExA
UnregisterClassA
CreateWindowExA
DestroyWindow
DefWindowProcW
DrawIconEx
GetCursorInfo
SelectObject
GetObjectW
BitBlt
CreateCompatibleBitmap
DeleteObject
CreateCompatibleDC
GetDIBits
GetDeviceCaps
DeleteDC
CommandLineToArgvW
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
VariantClear
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayGetLBound
DllInstall
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ