RunDllHostCallBack
Behavioral task
behavioral1
Sample
dc176b14e83ff21191a79bcf506dea55180300022930c8069fb00b7ef5154f87.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dc176b14e83ff21191a79bcf506dea55180300022930c8069fb00b7ef5154f87.dll
Resource
win10v2004-20220812-en
General
-
Target
dc176b14e83ff21191a79bcf506dea55180300022930c8069fb00b7ef5154f87
-
Size
103KB
-
MD5
81694b2bb15b5af53bca37e790fe756f
-
SHA1
3f581d795994707295ed2dc9270ff2c28d61acb7
-
SHA256
dc176b14e83ff21191a79bcf506dea55180300022930c8069fb00b7ef5154f87
-
SHA512
1020f4126fa268f2a28b7c8c6e50595c5fa924cd35edefad60b384a359a9c3522598ffb3f7b7366d866827fdaae768306f7bfdb5d5c6de87e93f13b1306fc223
-
SSDEEP
3072:xyZLYm4WuyTckIW9sxsNTNE1+eRZm/KyZP:ILYsuyTc/W9sQE1Je/Jt
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dc176b14e83ff21191a79bcf506dea55180300022930c8069fb00b7ef5154f87.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE