Static task
static1
Behavioral task
behavioral1
Sample
6d51c90b0c9b3f6fb9a6072e3ec43e3847cb4108f30d20724e66eb4449a5d604.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d51c90b0c9b3f6fb9a6072e3ec43e3847cb4108f30d20724e66eb4449a5d604.dll
Resource
win10v2004-20220812-en
General
-
Target
6d51c90b0c9b3f6fb9a6072e3ec43e3847cb4108f30d20724e66eb4449a5d604
-
Size
172KB
-
MD5
326f6a5a6218122e9daf5a291b971066
-
SHA1
7f83097dd1518bc50a650f21c34e141040a5a684
-
SHA256
6d51c90b0c9b3f6fb9a6072e3ec43e3847cb4108f30d20724e66eb4449a5d604
-
SHA512
7bff05d35ee54268fe0710a1446383c6aae388d86ef1d0316f96c8f16d8e0840281249456553b70ce00fd3c5dd0c487663300ff5bc65e0727f07d451c2bf734c
-
SSDEEP
3072:jLnkbiDMbCst4QW9Nr0duDi2nJSmAGsF7tmSSZEnS5FXiq9QMouHY2xE:jrwiiC9NIdui2JSF7ozWnSCqfoWY
Malware Config
Signatures
Files
-
6d51c90b0c9b3f6fb9a6072e3ec43e3847cb4108f30d20724e66eb4449a5d604.dll windows x86
80d6597cb462c3d52c6f607ef74578c7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetVersionExW
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
ResumeThread
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
SetThreadPriority
CreateFileW
GetPrivateProfileStringW
GetFileAttributesW
GetModuleFileNameW
SuspendThread
WaitForMultipleObjects
CreateEventW
FindNextFileW
OutputDebugStringW
DeleteFileW
CreateDirectoryW
TerminateProcess
MultiByteToWideChar
ole32
CoDeactivateObject
CoUninitialize
advapi32
RegQueryValueExA
RegOpenKeyExA
LsaGetSystemAccessAccount
RegSetValueExA
RegCreateKeyExA
RegCloseKey
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ