Static task
static1
Behavioral task
behavioral1
Sample
fc5c361d1938891237f54796de124dbe942f4742d680bff753f8a36620646266.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fc5c361d1938891237f54796de124dbe942f4742d680bff753f8a36620646266.dll
Resource
win10v2004-20221111-en
General
-
Target
fc5c361d1938891237f54796de124dbe942f4742d680bff753f8a36620646266
-
Size
32KB
-
MD5
02ff1609f9e2c8d0aa82d8ab2ab6f88d
-
SHA1
50f12723c8324e3077cd9258fa4a914cb8b88e7e
-
SHA256
fc5c361d1938891237f54796de124dbe942f4742d680bff753f8a36620646266
-
SHA512
0bb2fbc59a0361611b43fdc217d3e55cf69f0a0da311394743f20652daf6923ed0b854278dc07c13727ef1a71c3ba81f0549cb990f7f8ec968ce1aa68621dcf7
-
SSDEEP
384:7qsxZZA4mYZX025QHeRMnfRDZftYJ/xMJDqjyTS269qahkaZg4g37xri/jiuE5pb:7qR4mQTbW5Vfttd6saC2g1KKz
Malware Config
Signatures
Files
-
fc5c361d1938891237f54796de124dbe942f4742d680bff753f8a36620646266.dll windows x86
07aeec4a5798b12c7fe77945e4e974e7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
_initterm
malloc
_strdup
free
ntdll
NtQueryInformationProcess
NtSetInformationProcess
kernel32
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
FlushInstructionCache
Sleep
GetTickCount
QueryPerformanceCounter
RtlUnwind
CreateThread
FindClose
FindFirstFileA
GetVolumeInformationA
GetSystemDirectoryA
GetCommandLineA
VirtualProtect
IsBadReadPtr
GetProcAddress
GetModuleHandleA
VirtualFree
LoadLibraryA
VirtualAlloc
GetVersion
VerifyVersionInfoA
VerSetConditionMask
GetCurrentProcess
ExitThread
CloseHandle
ExitProcess
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ