mpstreg
Static task
static1
Behavioral task
behavioral1
Sample
c1e00e8ab04ac410b6178857dd8586368624863bf364e55f71579712109963f3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c1e00e8ab04ac410b6178857dd8586368624863bf364e55f71579712109963f3.dll
Resource
win10v2004-20220812-en
General
-
Target
c1e00e8ab04ac410b6178857dd8586368624863bf364e55f71579712109963f3
-
Size
10KB
-
MD5
4707bfab6508faa446cadacbd71670b0
-
SHA1
494ec88b6129462cd5169d66890c15265e86e007
-
SHA256
c1e00e8ab04ac410b6178857dd8586368624863bf364e55f71579712109963f3
-
SHA512
5868ff9f30d20e4db616908b0225f559887f2cef550a9226e12705e6f8971ae6000ef2d75b94f1b8b9970c181459000cb8ea769e9f9725a3de977f3ec1e98e7e
-
SSDEEP
192:sAzIml0Rl0+Xvzyj5Q3fy+BxWLUDpdRETMwMCxr41N:sAkmEhryj5Gy4UUD5PAr4
Malware Config
Signatures
Files
-
c1e00e8ab04ac410b6178857dd8586368624863bf364e55f71579712109963f3.dll windows x86
ad80d01ff47bfb5fa317fa3424028fb8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
kernel32
HeapAlloc
HeapFree
LocalFlags
OpenMutexA
RtlZeroMemory
GetTickCount
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
GetProcessHeap
GetModuleHandleA
CloseHandle
GetModuleFileNameA
CreateThread
Sleep
advapi32
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
IsValidSid
ws2_32
WSAStartup
accept
bind
closesocket
connect
gethostbyname
ioctlsocket
listen
recv
select
send
setsockopt
shutdown
socket
Exports
Exports
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 918B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 622B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ