Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.Hacktool.D.gen.Eldorado.19397.16594.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.Hacktool.D.gen.Eldorado.19397.16594.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.W32.Hacktool.D.gen.Eldorado.19397.16594.exe
-
Size
95KB
-
MD5
7cdd6daf5e4325b59d74d22d19b74a77
-
SHA1
b59e4a1cd45ee1f6c9d3fa174a2208c7cc0726e7
-
SHA256
ce1c3996573c61026433a25e560751fe7b93d1842f31e1098bcb30e93cd11c43
-
SHA512
3ad30bb76469907b56f0c1a46830d592c6e99c86c2f1f7df5f8cc1026e7c35c25d2c06293388691eee1db213a24fc7836a031065bb0b94144cf372319c83b546
-
SSDEEP
1536:D6KWj/FxnHSg+JkplzsCDDfP2pSgmHxL232B7FBRGY1/:NWrnHSPk3w6xgmRL2mB7FBRGY1/
Malware Config
Signatures
Files
-
SecuriteInfo.com.W32.Hacktool.D.gen.Eldorado.19397.16594.exe.exe windows x86
c94432d402541a9287957824d949b317
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateFileA
GetFileSize
Process32First
GetTickCount
OpenProcess
K32GetModuleFileNameExA
Sleep
ReadProcessMemory
Beep
ReadFile
Process32Next
GetProcessId
CreateToolhelp32Snapshot
Module32Next
CloseHandle
WriteProcessMemory
CreateThread
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
user32
SetLayeredWindowAttributes
DefWindowProcA
PeekMessageA
ShowWindow
TranslateMessage
SendMessageA
GetClientRect
LoadIconA
CreateWindowExA
ScreenToClient
GetCursorPos
ClientToScreen
RegisterClassExA
PostQuitMessage
DispatchMessageA
UpdateWindow
LoadCursorA
MoveWindow
GetWindowRect
GetForegroundWindow
GetAsyncKeyState
FindWindowA
mouse_event
shell32
ShellExecuteA
msvcp120
?_Winerror_map@std@@YAPBDH@Z
?_Syserror_map@std@@YAPBDH@Z
?_Xbad_alloc@std@@YAXXZ
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
_Thrd_equal
?_Throw_Cpp_error@std@@YAXH@Z
?_Random_device@std@@YAIXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Release@_Pad@std@@QAEXXZ
?_Launch@_Pad@std@@QAEXPAU_Thrd_imp_t@@@Z
??1_Pad@std@@QAE@XZ
??0_Pad@std@@QAE@XZ
?uncaught_exception@std@@YA_NXZ
_Xtime_get_ticks
_Thrd_join
_Thrd_current
_Thrd_sleep
_Xtime_diff_to_millis2
xtime_get
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
msvcr120
??1type_info@@UAE@XZ
memcpy
ceil
_libm_sse2_sqrt_precise
_libm_sse2_atan_precise
_libm_sse2_asin_precise
__CxxFrameHandler3
_CxxThrowException
_controlfp_s
_invoke_watson
__crtSetUnhandledExceptionFilter
_except_handler4_common
__crtTerminateProcess
__crtUnhandledException
_crt_debugger_hook
_commode
_fmode
memmove
vsprintf_s
_purecall
??3@YAXPAX@Z
atof
??2@YAPAXI@Z
memchr
??_V@YAXPAX@Z
rand
?terminate@@YAXXZ
_fdtest
?wait@Concurrency@@YAXI@Z
?_Id@_CurrentScheduler@details@Concurrency@@SAIXZ
_lock
_unlock
_calloc_crt
__dllonexit
_onexit
memset
_XcptFilter
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
_cexit
_configthreadlocale
__setusermatherr
_initterm_e
_initterm
__initenv
d3d9
Direct3DCreate9Ex
d3dx9_42
D3DXCreateFontA
D3DXCreateLine
dwmapi
DwmIsCompositionEnabled
DwmExtendFrameIntoClientArea
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ