Static task
static1
Behavioral task
behavioral1
Sample
081ebe3ee3153d01099bca64a6344e92c94d0923143fe15094ac2f735cd24c51.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
081ebe3ee3153d01099bca64a6344e92c94d0923143fe15094ac2f735cd24c51.dll
Resource
win10v2004-20220901-en
General
-
Target
081ebe3ee3153d01099bca64a6344e92c94d0923143fe15094ac2f735cd24c51
-
Size
59KB
-
MD5
931ef77ed2e1886d061258766ec43c4b
-
SHA1
0091471466b57d14e34d99c2ada5e88ab341d2a3
-
SHA256
081ebe3ee3153d01099bca64a6344e92c94d0923143fe15094ac2f735cd24c51
-
SHA512
330cbae23d224948904a6fa62fb89289c2ed785d66d804d34a90831f5801ad46635d1a7655807c992acac9fadb7d778752c89979142fbf161687b9dd8c700bb1
-
SSDEEP
384:GXC41robcW1IvBIONyjBzSFeQFSBmp1VKIDBrD+8dEeoeUN1t1PMh0:GXz7a2BI6UzSFemVKIND3qe3U7fMh0
Malware Config
Signatures
Files
-
081ebe3ee3153d01099bca64a6344e92c94d0923143fe15094ac2f735cd24c51.dll windows x86
d20d8ec0c7459eab21bdac914c22d486
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FindWindowA
GetWindowThreadProcessId
wsprintfA
kernel32
OpenProcess
GetStringTypeA
RtlUnwind
LCMapStringW
CloseHandle
CreateRemoteThread
CreateThread
ExitProcess
GetCurrentProcess
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
IsBadReadPtr
GetStringTypeW
ReadProcessMemory
RtlZeroMemory
Sleep
VirtualAllocEx
WriteProcessMemory
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
wininet
InternetOpenA
InternetOpenUrlA
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 974B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 530B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ