?VortexShardErase@@YG_KPAUHBITMAP__@@PAU_PSP@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
b4d688a5a206d4c5058f71eccbeb682cdd61a9b731b5c4fa1e62b4810628928f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b4d688a5a206d4c5058f71eccbeb682cdd61a9b731b5c4fa1e62b4810628928f.dll
Resource
win10v2004-20220812-en
General
-
Target
b4d688a5a206d4c5058f71eccbeb682cdd61a9b731b5c4fa1e62b4810628928f
-
Size
55KB
-
MD5
75b23990fcb17015624760280bb7ce78
-
SHA1
b7e8c49ea5c552c5915d81b1d2540f1694fc0776
-
SHA256
b4d688a5a206d4c5058f71eccbeb682cdd61a9b731b5c4fa1e62b4810628928f
-
SHA512
77edb2ec87420667a3167fa5c38ec51a4a1e31ed9617e108a25f887bec0af7a0674773d078b61b256f0025062f980c0294617e497851ebf63717aa532bf61b5b
-
SSDEEP
1536:bs+tkJc5yJA8zOfviiG7koxYR+qHyJPSQp7Td1BCR:b3OJoyZzOu7ko2R+bPJprBE
Malware Config
Signatures
Files
-
b4d688a5a206d4c5058f71eccbeb682cdd61a9b731b5c4fa1e62b4810628928f.dll windows x86
7ed06c53057118081bf12d99359a3510
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDC
IsCharUpperW
IsCharAlphaA
kernel32
GetTickCount
Exports
Exports
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.maps Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.p5 Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.p4 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.p3 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.p2 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.p1 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ