Static task
static1
Behavioral task
behavioral1
Sample
4c53750bdcaea0299498131950e153ec46c58855ecd3545700baff3aef30bcb0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c53750bdcaea0299498131950e153ec46c58855ecd3545700baff3aef30bcb0.dll
Resource
win10v2004-20220812-en
General
-
Target
4c53750bdcaea0299498131950e153ec46c58855ecd3545700baff3aef30bcb0
-
Size
23KB
-
MD5
69de4ed909976e2beb12d798a4c757e0
-
SHA1
214b8916b42218c9e0608ca3dd2ccee407824a5d
-
SHA256
4c53750bdcaea0299498131950e153ec46c58855ecd3545700baff3aef30bcb0
-
SHA512
9314ac02a1d702849d041f2b25688c71e6f88fd383d7ff55bf1afd8b47c2272fc646aafb38e4910d60013cb77133e03b090647961eca143ba3d37679cc38138c
-
SSDEEP
192:U6hKBtc0pWq8XHFY50hkc4HCl0P89qTlFIlFmDcCKpct5U9ZLHyA4sHXQ0B:UNCTq8XlY50hkciCZqpcCKpct54HTNh
Malware Config
Signatures
Files
-
4c53750bdcaea0299498131950e153ec46c58855ecd3545700baff3aef30bcb0.dll windows x86
0ba6c6bf21ccdeb054ffd531163a0e24
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ntohs
ntohl
msvcrt
atoi
free
_initterm
memcpy
_adjust_fdiv
_itoa
strcmp
strstr
strrchr
fseek
ftell
??2@YAPAXI@Z
strchr
strncpy
??3@YAXPAX@Z
fopen
fwrite
fclose
fread
time
memset
_strlwr
malloc
kernel32
ExitProcess
CreateThread
GetModuleHandleA
LoadLibraryA
CopyFileA
GetProcAddress
GetTempPathA
lstrcmpA
lstrcpyA
lstrlenA
ReadProcessMemory
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
GetModuleFileNameA
lstrcatA
Sleep
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1014B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 678B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ