Static task
static1
Behavioral task
behavioral1
Sample
0a24ed4c250c41bc0238fb0f06fef6701f4d9f748f6b05f7a8bdd73d0f8b7c7d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a24ed4c250c41bc0238fb0f06fef6701f4d9f748f6b05f7a8bdd73d0f8b7c7d.dll
Resource
win10v2004-20220812-en
General
-
Target
0a24ed4c250c41bc0238fb0f06fef6701f4d9f748f6b05f7a8bdd73d0f8b7c7d
-
Size
27KB
-
MD5
a0bcf938c97b10bc37682dea860548c0
-
SHA1
a7b7cc88f135b2da66ca5d851831ab37680a4758
-
SHA256
0a24ed4c250c41bc0238fb0f06fef6701f4d9f748f6b05f7a8bdd73d0f8b7c7d
-
SHA512
e9e4d004991ad58fafc0b3f153eb4d53e36aea85112f78770d2bea6afb19e82deb1855b49006d63b8a205f3c274a4c2af2a3971659a43588d20ac4b642757924
-
SSDEEP
192:M+UxzaA5ewCeGW3Zp+/5nGFdFlois1wqQPpct5UUNGc1S:JA5vCeppp25nSFK1wqApct5JNGKS
Malware Config
Signatures
Files
-
0a24ed4c250c41bc0238fb0f06fef6701f4d9f748f6b05f7a8bdd73d0f8b7c7d.dll windows x86
db20755e4c3b9f998fe0f51d55591387
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ntohs
ntohl
closesocket
msvcrt
malloc
_initterm
_strupr
free
atoi
memcpy
strcmp
fwrite
time
strrchr
fopen
fseek
ftell
??2@YAPAXI@Z
memset
fread
fclose
strstr
strchr
strncpy
??3@YAXPAX@Z
_strlwr
_itoa
_adjust_fdiv
kernel32
TerminateProcess
Sleep
lstrcmpA
WaitForSingleObject
SetEvent
CreateThread
GetModuleHandleA
LoadLibraryA
CopyFileA
GetProcAddress
GetTempPathA
WideCharToMultiByte
lstrcpyA
lstrlenA
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
GetModuleFileNameA
CreateEventA
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ