RunDllHostCallBack
Behavioral task
behavioral1
Sample
f02ff653cc46bfcd7e202f8cc7c7117d17d9146e25f87fe58be87c5ab7822b81.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f02ff653cc46bfcd7e202f8cc7c7117d17d9146e25f87fe58be87c5ab7822b81.dll
Resource
win10v2004-20221111-en
General
-
Target
f02ff653cc46bfcd7e202f8cc7c7117d17d9146e25f87fe58be87c5ab7822b81
-
Size
71KB
-
MD5
a7c0c4210662d5500126839a32a4ef92
-
SHA1
44e0a06e8f57b57645e90b57a027200a0de1c654
-
SHA256
f02ff653cc46bfcd7e202f8cc7c7117d17d9146e25f87fe58be87c5ab7822b81
-
SHA512
940cbceeb1d3e4b83be1c47f7354f6caeb5ca4775498b50fc16f9cc1f59cdc00e4bf0f8b53b4ebc3eb19cc7690ec8664ae86ef3adef31735fe3f96c0e0ef7278
-
SSDEEP
768:cURySApWAttCYcc482r5Wux/VyTwKhYOK6HNpb9NlP5VL9XcoeV6:xyXpW8Yxc4twuyTwGRhVLJcos6
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f02ff653cc46bfcd7e202f8cc7c7117d17d9146e25f87fe58be87c5ab7822b81.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE