DllInstall
DllRegisterServer
Behavioral task
behavioral1
Sample
2d79971a0f59631271cd1605f8eb39ecdf57e39fbfff88494df0c69ec6fd0d34_unpacked.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2d79971a0f59631271cd1605f8eb39ecdf57e39fbfff88494df0c69ec6fd0d34_unpacked.dll
Resource
win10v2004-20220901-en
Target
2d79971a0f59631271cd1605f8eb39ecdf57e39fbfff88494df0c69ec6fd0d34_unpacked
Size
156KB
MD5
e5eb07b009ca666f91ef5fe48269ca52
SHA1
3ad892dec81655309785e185754319f38ebbf437
SHA256
78fc57ab2b1c1e68714e98168bf15521d08081219f19f7b539109f9b2fa35fbf
SHA512
1ae92e9632d6798f643cb400b6ebb34148d0bb978a9a01175046138554d50ed0eb2fbdb3a4c75b308625d0c3f130570f2d8768425589983baecccc9391bc2949
SSDEEP
3072:659rTfxRO0ffjPANJo+Hh4TBf9b/6oVO/ya:Q9rTps0fb4NJFHh4TBVb/vE/
qakbot
403.973
obama212
1665497532
190.11.198.76:443
41.111.85.167:443
134.35.2.138:443
105.108.80.229:443
179.113.97.4:32101
197.158.89.85:443
197.204.101.178:443
105.69.147.88:995
41.103.252.215:443
41.104.109.190:443
41.107.209.163:443
14.227.159.241:443
82.12.196.197:443
103.156.237.139:443
196.235.137.166:443
181.141.3.126:443
102.157.22.8:443
41.111.52.120:443
197.92.143.218:443
181.44.34.172:443
94.52.127.44:443
148.213.109.165:995
163.182.177.80:443
58.186.75.42:443
1.32.64.190:80
72.88.245.71:443
102.158.135.167:443
190.100.149.122:995
186.86.212.138:443
118.216.99.232:443
41.99.208.154:443
23.225.104.250:443
186.18.77.99:443
186.188.96.197:443
41.96.120.232:443
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
memchr
_strtoi64
_errno
_snprintf
qsort
_vsnprintf
memset
_time64
_vsnwprintf
malloc
strncpy
strchr
strtod
localeconv
_ftol2_sse
free
atol
memcpy
FindNextFileW
GetTickCount
GetModuleHandleA
GetWindowsDirectoryW
GetCurrentDirectoryW
CreateMutexW
DuplicateHandle
GetCurrentThread
lstrcmpA
GetLastError
lstrcatA
GetLocaleInfoA
CreateDirectoryW
DisconnectNamedPipe
lstrcpynW
GetProcessId
lstrcatW
lstrcpyW
GetFileAttributesW
lstrcmpiW
GetDriveTypeW
K32GetModuleFileNameExW
MoveFileW
lstrcpynA
lstrlenW
GetCurrentProcessId
SwitchToThread
GetModuleHandleW
GetProcAddress
HeapCreate
HeapFree
HeapAlloc
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
FreeLibrary
lstrcmpiA
GetSystemTimeAsFileTime
SetThreadPriority
GetExitCodeProcess
FindFirstFileW
GetSystemInfo
SetFileAttributesW
LocalAlloc
FlushFileBuffers
LoadLibraryW
GetCommandLineW
GetVersionExA
GetIconInfo
CopyIcon
GetDC
CharUpperBuffA
CharUpperBuffW
RegisterClassExA
UnregisterClassA
CreateWindowExA
DestroyWindow
DefWindowProcW
DrawIconEx
GetCursorInfo
SelectObject
GetObjectW
BitBlt
CreateCompatibleBitmap
DeleteObject
CreateCompatibleDC
GetDIBits
GetDeviceCaps
DeleteDC
CommandLineToArgvW
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
VariantClear
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayGetLBound
DllInstall
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ