Static task
static1
Behavioral task
behavioral1
Sample
b98ff835a93e8b0382b202e6d818dd9694d0b70595745faa714af649e66bb0ce.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b98ff835a93e8b0382b202e6d818dd9694d0b70595745faa714af649e66bb0ce.dll
Resource
win10v2004-20220901-en
General
-
Target
b98ff835a93e8b0382b202e6d818dd9694d0b70595745faa714af649e66bb0ce
-
Size
21KB
-
MD5
80e96082d1d063a993761e50593df8ef
-
SHA1
1979e8379c37e7345527b31dd2988f10e7bf3bd7
-
SHA256
b98ff835a93e8b0382b202e6d818dd9694d0b70595745faa714af649e66bb0ce
-
SHA512
38a279fec9169b128c5d7374e6c56c731c802728ed0988e2a7195f229c23c6b01bd4100c11ab20b3b21f02360e8fdf3c0a21109da54a83c3d972fcf18c92fb4f
-
SSDEEP
384:MG1iIBkRo4yvbblrsoD+o42Kz0yqVrr9Tkdx+ZomTUJd:MGMIBqbyvJT+o9KQdrq+uIUJd
Malware Config
Signatures
Files
-
b98ff835a93e8b0382b202e6d818dd9694d0b70595745faa714af649e66bb0ce.dll windows x86
89e2396e69ee0d86b8687460dcabfa85
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetLastError
GetTickCount
VirtualAlloc
VirtualFree
GetProcAddress
LoadLibraryA
GetCurrentThreadId
CloseHandle
CreateProcessA
GetTempPathA
GetVersionExA
CreateThread
ReadProcessMemory
GetCurrentProcess
ExitProcess
WriteProcessMemory
VirtualProtectEx
GetModuleHandleA
GetModuleFileNameA
user32
GetMessageA
PostThreadMessageA
GetInputState
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ws2_32
shutdown
closesocket
inet_ntoa
gethostbyname
select
connect
inet_addr
htons
ioctlsocket
socket
send
recv
__WSAFDIsSet
WSACleanup
WSAStartup
gethostname
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ