blackhole
Static task
static1
Behavioral task
behavioral1
Sample
7cc7661b277d1f0177bdd4325e9616bf7d97e56b6579bfaf3dee237d65ee88ee.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7cc7661b277d1f0177bdd4325e9616bf7d97e56b6579bfaf3dee237d65ee88ee.dll
Resource
win10v2004-20220812-en
General
-
Target
7cc7661b277d1f0177bdd4325e9616bf7d97e56b6579bfaf3dee237d65ee88ee
-
Size
372KB
-
MD5
5fcab10263388014340a420c3b4d34a5
-
SHA1
cb0fb0288106f26d73986a0479c4503804163f43
-
SHA256
7cc7661b277d1f0177bdd4325e9616bf7d97e56b6579bfaf3dee237d65ee88ee
-
SHA512
c2a1229b4f7c9c875e695924230ba34fc5b900945098ee83f76819e75fbf0c6bed4eca45f2d9709981bcdb7de68a6a188f92ac284c482e4963ba7a4ebc455198
-
SSDEEP
6144:U5md0iCKuMmUX32PfQ/K2IskjL5sssnssssssssssssssssssssssssssnKb1dbO:vxCKuFUXuSTgX6b8A3e9X4
Malware Config
Signatures
Files
-
7cc7661b277d1f0177bdd4325e9616bf7d97e56b6579bfaf3dee237d65ee88ee.dll windows x86
051981c536fba439d9887c00303b8b1f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
FreeLibrary
GetFileSize
GetCurrentProcess
LocalFree
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
RaiseException
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
ExitProcess
TerminateProcess
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
SetUnhandledExceptionFilter
VirtualAlloc
HeapReAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
CloseHandle
SetFilePointer
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
InterlockedExchange
VirtualQuery
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetSystemInfo
SetStdHandle
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
VirtualProtect
LoadLibraryA
GetModuleHandleA
GetProcAddress
FlushFileBuffers
CopyFileA
GetLastError
SetFileAttributesA
user32
GetSystemMetrics
advapi32
GetSidSubAuthorityCount
GetSidSubAuthority
GetSidIdentifierAuthority
IsValidSid
OpenProcessToken
Exports
Exports
Sections
.text Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init_t Size: 4KB - Virtual size: 329B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.init_d Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE