pcgxePtbw
Static task
static1
Behavioral task
behavioral1
Sample
ad8b56fdebe16624191e8bfb03c1d0f2bc893e3ae9f24c9e370916085cf9a9e6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad8b56fdebe16624191e8bfb03c1d0f2bc893e3ae9f24c9e370916085cf9a9e6.dll
Resource
win10v2004-20220812-en
General
-
Target
ad8b56fdebe16624191e8bfb03c1d0f2bc893e3ae9f24c9e370916085cf9a9e6
-
Size
745KB
-
MD5
4f6d79f54bf80dc0238250e80af8c107
-
SHA1
76e98e4ef45c6a5a83b44044b20aa80e2d0bc26e
-
SHA256
ad8b56fdebe16624191e8bfb03c1d0f2bc893e3ae9f24c9e370916085cf9a9e6
-
SHA512
8ffc7a9fb307ca23a43c4d43dca32826d7cc3966ba4f34c855d57bafe242e339299ac31d0e9a7bb43c89b228d9c7622fa4f2aab2e90d1a71d3909634ddebcb60
-
SSDEEP
12288:8MStk5/HQlsPDPF9ZO9J4uvb+0QjHdrhhLDWwHt6Jwak6eAHtBv63t2J:8DtWJ9AvGdLibJwNTAHXa2
Malware Config
Signatures
Files
-
ad8b56fdebe16624191e8bfb03c1d0f2bc893e3ae9f24c9e370916085cf9a9e6.dll windows x86
baa93d47220682c04d92f7797d9224ce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Exports
Exports
Sections
Size: 95KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 816KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jcqfkjzs Size: 642KB - Virtual size: 644KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rcrqpxyh Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE