Behavioral task
behavioral1
Sample
729a370044d33188dc690de878ee84dee67310813b1ffd0ad79d87ff53a2ad7b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
729a370044d33188dc690de878ee84dee67310813b1ffd0ad79d87ff53a2ad7b.dll
Resource
win10v2004-20220901-en
General
-
Target
729a370044d33188dc690de878ee84dee67310813b1ffd0ad79d87ff53a2ad7b
-
Size
188KB
-
MD5
80b78cb99d25d7935f47cb132b80f9e0
-
SHA1
bfb0aaa37f8e128bc1e04d6cb9ddbb869a432501
-
SHA256
729a370044d33188dc690de878ee84dee67310813b1ffd0ad79d87ff53a2ad7b
-
SHA512
098b41a0d6da9459ec238aec3fe7a7ef1bb4af8a9b9ddf7254536158d3cb0ef18e8f0b9919390906f23fae5ad8a8a76197bde2babf9cc0f898dd73f78f88a554
-
SSDEEP
3072:z5cbloNbtZf4coSM7L6OC/35JW0Kb/YgRQwaTVVxWiQrk:AqZf4px7dC/35JWjYgWvxWrr
Malware Config
Signatures
-
Detects PlugX payload 1 IoCs
Processes:
resource yara_rule sample family_plugx -
Plugx family
Files
-
729a370044d33188dc690de878ee84dee67310813b1ffd0ad79d87ff53a2ad7b.dll windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
_FLAT Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ