Behavioral task
behavioral1
Sample
54fcc36053eaddd6014673ea9cc3da3f9977eb723794bb8f4e98f4f7b1662698.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54fcc36053eaddd6014673ea9cc3da3f9977eb723794bb8f4e98f4f7b1662698.dll
Resource
win10v2004-20220812-en
General
-
Target
54fcc36053eaddd6014673ea9cc3da3f9977eb723794bb8f4e98f4f7b1662698
-
Size
99KB
-
MD5
966591c9102494596a2e0d3ea4a32c30
-
SHA1
8433b99220a120fece63d8a2ebbb868cd501ec72
-
SHA256
54fcc36053eaddd6014673ea9cc3da3f9977eb723794bb8f4e98f4f7b1662698
-
SHA512
c2af386dfb00c4d1b9bfbf2c6895c5bcc9f9bb9a5ba8bbbd6ddc375693050e7d2bc5eaf22b491871c9fa3132c4c488299dde1b9c4b0c5e91e30a9786bd4f382a
-
SSDEEP
3072:7X2xzwrAMnOAlueS3z9i5ynpBLHj6x4P2vtUB:jY08MnVdS3z9LvFOvtm
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
54fcc36053eaddd6014673ea9cc3da3f9977eb723794bb8f4e98f4f7b1662698.dll windows x86
ae3e8c90862e42e2a58d74015b7c841e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
advapi32
FreeSid
msvcrt
free
user32
SetPropA
ws2_32
htonl
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 93KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rorg Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE