ebknvdyl
Static task
static1
Behavioral task
behavioral1
Sample
3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f.dll
Resource
win10v2004-20220901-en
General
-
Target
3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f
-
Size
92KB
-
MD5
9408415c87170079876f5b4a2d50ea8d
-
SHA1
2477e396894b4eb1a74ceb38a3cc26952788694e
-
SHA256
3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f
-
SHA512
dad98efc955c9787a292459d840310714eb8bda95297a76121c8a40a0f7181f950d0986d008b543ce9ead931c42da7b1c47dbb6b5e6adaad0a7947b4f2316793
-
SSDEEP
1536:Ys/vYYK0BeKCP5uZ1qyCK2MTCOKAgSeHVpJsm3QDN0LS/lAxHuxd:3nVKp5uZQK2kKAg5H/JsmDLSyUD
Malware Config
Signatures
Files
-
3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f.dll windows x86
2324d8fb235f249c435aefbf05343e4a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetFullPathNameW
SetEndOfFile
GetDiskFreeSpaceExW
GetLogicalDriveStringsW
GetModuleHandleW
DeleteFileW
GetSystemInfo
GetVersionExW
SetFilePointerEx
GetCurrentThread
GetDriveTypeW
FormatMessageW
GetProcAddress
CreateHardLinkW
GetModuleHandleA
GetVolumeInformationW
GetTimeFormatW
LocalFree
GetFileSizeEx
GetDateFormatW
CloseHandle
GetLastError
CreateFileW
DeviceIoControl
advapi32
OpenEventLogW
LookupAccountSidW
RevertToSelf
LookupAccountNameW
AdjustTokenPrivileges
AllocateAndInitializeSid
LookupPrivilegeValueW
CheckTokenMembership
CloseEventLog
OpenProcessToken
OpenThreadToken
ImpersonateSelf
ReadEventLogW
LookupAccountSidA
Exports
Exports
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 534B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ