startNow
Behavioral task
behavioral1
Sample
280fc43c89ad0439398cc56a14e575dc72fb3600fdb48600e0034911e455a949.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
280fc43c89ad0439398cc56a14e575dc72fb3600fdb48600e0034911e455a949.dll
Resource
win10v2004-20221111-en
General
-
Target
280fc43c89ad0439398cc56a14e575dc72fb3600fdb48600e0034911e455a949
-
Size
23KB
-
MD5
43b295d1fea3965542b806c8cc418f30
-
SHA1
4d3995976b8a26da06d38c3e016e9e1779d7d31c
-
SHA256
280fc43c89ad0439398cc56a14e575dc72fb3600fdb48600e0034911e455a949
-
SHA512
076b26a203afc4c2c4c69e6fa2bd7afa2ba9844d84dadf44262cfe8a6cd31144c0434c9b1a2f27001b0b7e02be1b340adde61d4bfe314d69a60faf4288d46b8c
-
SSDEEP
96:mT1bWEGSocimNPTwzX74ARim1RJwHcA659:Wp/NimmoUxwHcA659
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
280fc43c89ad0439398cc56a14e575dc72fb3600fdb48600e0034911e455a949.dll windows x86
0bd8e0bc8d07ee919b01eb1915000ab6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnmapViewOfFile
MapViewOfFile
CloseHandle
OpenFileMappingA
GetModuleFileNameA
Beep
GetLocalTime
msvcrt
_beginthread
malloc
_strlwr
_splitpath
_itoa
strcat
strlen
sprintf
strcpy
memmove
strcmp
_adjust_fdiv
atoi
free
__dllonexit
_onexit
_initterm
user32
SetWindowsHookExA
SetTimer
MessageBoxA
KillTimer
CallNextHookEx
ws2_32
Exports
Exports
Sections
UPX0 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE