DllInstall
DllRegisterServer
Behavioral task
behavioral1
Sample
3c5fadfb93b75d524499fd7978b0e7baca0fa3d577df9b6d8dd7228d91ee17cd_unpacked.dll
Resource
win7-20220901-en
Target
3c5fadfb93b75d524499fd7978b0e7baca0fa3d577df9b6d8dd7228d91ee17cd_unpacked
Size
126KB
MD5
b857efb30d9e35bc83a294580ad8cc3a
SHA1
6c850d5d6e47da76fe322573be0ae52a20631b7c
SHA256
93808843b9afa92995e5cd3dadf019cf2d2c00573e1a6c648396ec6b3a738a93
SHA512
ceaaad92c02316f45d641a2b4b5682bf1ca54872b64c24afbbc23d294139a55cb6598a7d1d6275bcc3bd0872328066c8538e0c9cf4a3b122898394dc81029c0f
SSDEEP
3072:WSIPQLrXGz6+cC9WU5CACPJHjLg3oTBfJVYq7:W0XGO+J9RHCPJDLcoTBhaq7
qakbot
403.914
obama211
1665387262
197.92.143.218:443
134.35.4.128:443
41.97.127.116:443
42.189.2.151:80
105.99.214.100:443
163.182.177.80:443
197.204.78.120:443
186.18.77.99:443
190.73.190.235:443
197.11.134.255:443
86.196.181.62:2222
94.52.127.44:443
181.141.3.126:443
41.96.120.232:443
190.100.149.122:995
197.1.78.64:443
105.108.189.56:443
102.157.9.107:443
186.86.212.138:443
41.107.236.152:443
79.100.58.254:443
41.104.205.70:443
180.65.194.65:443
105.69.190.93:995
197.206.156.39:443
196.65.255.151:995
197.158.89.85:443
156.174.6.132:443
113.162.197.121:443
85.110.133.32:443
148.213.109.165:995
41.101.200.226:443
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
memchr
_strtoi64
_errno
_snprintf
qsort
_vsnprintf
memset
_time64
_vsnwprintf
malloc
strncpy
strchr
strtod
localeconv
_ftol2_sse
free
atol
memcpy
FindNextFileW
GetTickCount
GetModuleHandleA
GetWindowsDirectoryW
GetCurrentDirectoryW
CreateMutexW
DuplicateHandle
GetCurrentThread
lstrcmpA
GetLastError
lstrcatA
CreateDirectoryW
DisconnectNamedPipe
lstrcpynW
GetProcessId
lstrcatW
lstrcpyW
GetOEMCP
GetFileAttributesW
lstrcmpiW
GetDriveTypeW
K32GetModuleFileNameExW
MoveFileW
lstrcpynA
lstrlenW
GetCurrentProcessId
SwitchToThread
GetModuleHandleW
GetProcAddress
HeapCreate
HeapFree
HeapAlloc
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
FreeLibrary
lstrcmpiA
GetSystemTimeAsFileTime
SetThreadPriority
GetExitCodeProcess
FindFirstFileW
GetSystemInfo
SetFileAttributesW
LocalAlloc
FlushFileBuffers
LoadLibraryW
GetCommandLineW
GetVersionExA
GetIconInfo
CopyIcon
GetDC
CharUpperBuffA
CharUpperBuffW
RegisterClassExA
UnregisterClassA
CreateWindowExA
DestroyWindow
DefWindowProcW
DrawIconEx
GetCursorInfo
SelectObject
GetObjectW
BitBlt
CreateCompatibleBitmap
DeleteObject
CreateCompatibleDC
GetDIBits
GetDeviceCaps
DeleteDC
CommandLineToArgvW
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
VariantClear
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayGetLBound
DllInstall
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ