RunDllHostCallBack
Behavioral task
behavioral1
Sample
d4fe04c0726975d55d68441430b72b6ef8774cdd3470d6c8388ad9ea583ff9d1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4fe04c0726975d55d68441430b72b6ef8774cdd3470d6c8388ad9ea583ff9d1.dll
Resource
win10v2004-20220812-en
General
-
Target
d4fe04c0726975d55d68441430b72b6ef8774cdd3470d6c8388ad9ea583ff9d1
-
Size
86KB
-
MD5
4e2e6c21c33d483cce7d5c47579a45c6
-
SHA1
507c17dbe1db662660a14129040d73efb472f244
-
SHA256
d4fe04c0726975d55d68441430b72b6ef8774cdd3470d6c8388ad9ea583ff9d1
-
SHA512
2b8e7815f648275360cd93537fbbda5759d4943670b3b060a61caf4abc0ef8c85618eb1319d68002a4520f3a36e172ff868a083d4acd23a23b674079cf428143
-
SSDEEP
1536:ETZ1EU0MUCL7Hy8cpbxHutleh1WFNqC3zXwEJSSXAvPaT0C:ETZ1EU3LWpbJam0n7wOJcP60C
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d4fe04c0726975d55d68441430b72b6ef8774cdd3470d6c8388ad9ea583ff9d1.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE